DISCARDED: Tales From the Threat Research Trenches cover image

Web Bugs & the Tubthumping Tactics of Chinese Threat Actor TA416

DISCARDED: Tales From the Threat Research Trenches

00:00

The Evolution of Malware Development

PIM: When a piece of malware has been so effective for 15 years, it just keeps on adding to the fact that you're going to want to keep using it. So we're seeing them cycle through multiple chains to execute that payload as well as different encryptions and flow controls within the plug X payload itself. I think they might have a pool of four to five different variants of plug X that might fit their use cases depending on their targets better. That's also a topic theory that I think could be real.

Play episode from 18:01
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app