3min chapter

The Defender's Advantage Podcast cover image

Threat Trends: An Episode (Mostly) About Non-Ransomware Cyber Crime

The Defender's Advantage Podcast

CHAPTER

The Evolution of Beacon Attack Frameworks

In the early days of Fin6's foray into extortion operations Mandiant had seen three distinct individuals sort of working through a single victim network and in this case each of them was using a different attack framework. And so that just kind of goes to highlight that to some degree there is a sense of sort of personal preference or familiarity that has driven some of the diversity we've seen as well. It's also important to note that in a lot of cases we do see these actors using these frameworks in tandem as I previously suggested right. So you know their decision can be driven by practicalities and change over time as even if they're using cobalt strike potentially they get access to a new cracked copy

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode