Microsoft Threat Intelligence Podcast cover image

Octo Tempest Threat Actor Profile

Microsoft Threat Intelligence Podcast

00:00

Octo Tempest: Tactics and Techniques

This chapter discusses the tactics and techniques used by the threat actor profile Octo Tempest, including social engineering, sim swapping, SMS phishing, enumeration and information gathering. It explores their extensive research on targets, use of compromised data, short dwell time, modification of security tools, and manipulation of mailbox rules to hide their tracks.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app