The Defender's Advantage Podcast cover image

Threat Trends: UNC3524 - Eye Spy on Your Email

The Defender's Advantage Podcast

00:00

Detecting a Thread Actor Intruder in a Home Security System

The adversary also took the care to utilize compromise iot devices outside the victim environment. One of the first commanding control ip addresses we found turned out to be an innernet accessible video conferencig camera. We don't have any reason to believe that there's a supply chain like angle to this. For them to function as the attackers hot point or se to address, they need to be inaccessible - which they're not supposed to be by design.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app