Episode
89: Cybereason - Molerats in the Cloud
Description
The threat research team at Cybereason uncovered an interesting piece of malware. Studied it and tracked it. Which lead them to believe they were dealing with a threat actor known as Molerats. Sponsors This episode is sponsored by Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in your hands. Their future-ready attack platform gives defenders the wisdom to uncover, understand, and piece together multiple threats. And the precision focus to end cyberattacks instantly – on computers, mobile devices, servers, and the cloud. They do all this through a variety of tools they’ve developed such as antivirus software, endpoint monitoring, and mobile threat detection tools. They can give you the power to do it yourself, or they can do all the monitoring and respond to threats in your environment for you. Or you can call them after an incident to get help cleaning up. If you want to monitor your network for threats, check out what Cybereason can do for you. Cybereason. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet. View all active sponsors. Sources https://www.cybereason.com/hubfs/dam/collateral/reports/Molerats-in-the-Cloud-New-Malware-Arsenal-Abuses-Cloud-Platforms-in-Middle-East-Espionage-Campaign.pdf https://malpedia.caad.fkie.fraunhofer.de/actor/molerats https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html Learn more about your ad choices. Visit podcastchoices.com/adchoices
Chapters
Cyber Reason, a company specialized in email and workplace collaboration security solutions, is sponsoring an extra episode of the podcast and promoting their product's ability to detect suspicious emails and diversify security measures.
00:00 - 02:33 (02:33)
Summary
Cyber Reason, a company specialized in email and workplace collaboration security solutions, is sponsoring an extra episode of the podcast and promoting their product's ability to detect suspicious emails and diversify security measures.
Episode89: Cybereason - Molerats in the Cloud
PodcastDarknet Diaries
Hear about the unique training of Unit 8200, Israel's intelligence unit, which teaches young recruits to become experts in information manipulation and access.
02:34 - 12:52 (10:18)
Summary
Hear about the unique training of Unit 8200, Israel's intelligence unit, which teaches young recruits to become experts in information manipulation and access. The unit's training includes both formal computer science studies and secret missions with intelligence agencies.
Episode89: Cybereason - Molerats in the Cloud
PodcastDarknet Diaries
Cybersecurity company, Leor Grebler's Vocalis Health, highlights the importance of collecting massive amounts of data in real time to analyze and detect malicious behavior rather than just indicators of compromise like malware or bad IP addresses.
12:52 - 22:03 (09:10)
Summary
Cybersecurity company, Leor Grebler's Vocalis Health, highlights the importance of collecting massive amounts of data in real time to analyze and detect malicious behavior rather than just indicators of compromise like malware or bad IP addresses. By using AI, organizations can detect activity that looks benign but is actually a threat to their security.
Episode89: Cybereason - Molerats in the Cloud
PodcastDarknet Diaries
A cybersecurity response team has the ability to not only detect malicious activity in a network, but also has the resources to fix issues.
22:03 - 27:13 (05:10)
Summary
A cybersecurity response team has the ability to not only detect malicious activity in a network, but also has the resources to fix issues. They can identify every step of a hack and understand the password used in the process.
Episode89: Cybereason - Molerats in the Cloud
PodcastDarknet Diaries
The technical aspect of working in threat intelligence must be tied to a global or geopolitical context to gain a better understanding of what's really going on beyond just the technical aspects of how attacks occur.
27:13 - 33:24 (06:10)
Summary
The technical aspect of working in threat intelligence must be tied to a global or geopolitical context to gain a better understanding of what's really going on beyond just the technical aspects of how attacks occur. The discussion is followed by a story from the threat research team about their discovery of a new and interesting piece of malware.
Episode89: Cybereason - Molerats in the Cloud
PodcastDarknet Diaries
Researchers found new types of malware and remote control capabilities being used by hackers.
33:24 - 43:43 (10:19)
Summary
Researchers found new types of malware and remote control capabilities being used by hackers. The malware exfiltrated data through Dropbox and had remote access capabilities, with hackers able to control the infected computer remotely.
Episode89: Cybereason - Molerats in the Cloud
PodcastDarknet Diaries
Cyber Reason tracks and publishes reports on the actions of various hacker groups, including the mole rats, to make the world more secure.
43:43 - 58:28 (14:45)
Summary
Cyber Reason tracks and publishes reports on the actions of various hacker groups, including the mole rats, to make the world more secure. With 51 threat intelligence reports on mole rats by various security companies, the system collects evidence and evolves it to suspicions to correlate multiple evidence and identify actual attacks.
Episode89: Cybereason - Molerats in the Cloud
PodcastDarknet Diaries
Cyber Reason is a cybersecurity company with offices around the world, helping their customers protect their networks from malicious activity.
58:29 - 59:30 (01:01)
Summary
Cyber Reason is a cybersecurity company with offices around the world, helping their customers protect their networks from malicious activity. They offer demos of their products if interested, and have had a long-lasting satisfied customer since their early days.