
ISC StormCast for Wednesday, August 17th, 2022
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
00:00
Detecting Intrusion Detection Using Location Anchors
The real interesting part of these rite ups is always the different techniques and such that these adversaries are using. Makraso talks about how they, for example, use linked in accounts in order to collect open source intelligence on their targets. They will also set up email addresses with free email providers impersonating certain individuals. And then they start sending some harmless, friendly messages, just enough to establish a conversation and lvite a report with the victim before they are then sending some weaponized email. Maksot's block includes many samples and additional details to help you identify possible intrusion spy this group.
Transcript
Play full episode