15min chapter

Microsoft Threat Intelligence Podcast cover image

Octo Tempest Threat Actor Profile

Microsoft Threat Intelligence Podcast

CHAPTER

Octo Tempest: Tactics and Techniques

This chapter discusses the tactics and techniques used by the threat actor profile Octo Tempest, including social engineering, sim swapping, SMS phishing, enumeration and information gathering. It explores their extensive research on targets, use of compromised data, short dwell time, modification of security tools, and manipulation of mailbox rules to hide their tracks.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode