AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Threat Intelligence Analyst Simeon Kakpovi, Intelligence Analyst Lauren Podber, and Senior Hunt Analyst Emiel Haeghebaert. In this episode, Sherrod and guests explore the evolving nature of the Iranian APT group known as "Peach Sandstorm." They discuss how they mature over time while providing valuable insights into APT actors and their evolving strategies. They discuss techniques such as password spraying and the next steps attackers take to establish persistence within the victim's environment. Sherrod also highlights Iran's unique approach to cyber operations, where they exhibit creativity and perseverance in achieving their objectives, even when they may only sometimes be the most technically sophisticated group among nation-state actors.
In this episode you’ll learn:
Some questions we ask:
Resources:
How Microsoft Names Threat Actors
View Simeon Kakpovi on LinkedIn
View Lauren Podber on LinkedIn
View Emiel Haeghebaert on LinkedIn
View Sherrod DeGrippo on LinkedIn
Peach Sandstorm
Ingredients:
- 1 ripe peach, peeled and pitted
- 1 1/2 oz Arak (a traditional Middle Eastern aniseed-flavored spirit)
- 1 oz fresh lemon juice
- 1 oz rose water
- 1/2 oz simple syrup
- A pinch of saffron strands (soaked in 1 tablespoon of warm water for 10 minutes)
- Crushed ice
- Fresh mint leaves for garnish
- Edible rose petals for garnish
Instructions:
1. In a blender, combine the peach, Arak, lemon juice, rose water, simple syrup, saffron water, and a good amount of crushed ice.
2. Blend until smooth and frosty.
3. Pour into a chilled glass.
4. Garnish with fresh mint leaves and edible rose petals.
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Get the latest threat intelligence insights and guidance at Microsoft Security Insider
The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of The CyberWire Network.