Microsoft Threat Intelligence Podcast cover image

Octo Tempest Threat Actor Profile

Microsoft Threat Intelligence Podcast

CHAPTER

Octo Tempest: Tactics and Techniques

This chapter discusses the tactics and techniques used by the threat actor profile Octo Tempest, including social engineering, sim swapping, SMS phishing, enumeration and information gathering. It explores their extensive research on targets, use of compromised data, short dwell time, modification of security tools, and manipulation of mailbox rules to hide their tracks.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner