

DISCARDED: Tales From the Threat Research Trenches
Proofpoint
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more.Welcome to DISCARDED
Episodes
Mentioned books

Mar 5, 2024 • 27min
Hiding In Plain Sight: Unique Methods Of C2 From Infostealers
Send us fan mail!Network-based detections, such as those developed by threat detection engineers using tools like suricata and snort signatures, play a crucial role in identifying and mitigating cyber threats by scrutinizing and analyzing network traffic for malicious patterns and activities.Today’s guest is Isaac Shaughnessy, a Threat Detection Engineer at Proofpoint. Isaac shares his insights into the challenges of detecting and mitigating malware, especially those using social platforms for command and control. He emphasizes the team's engagement with the InfoSec community, highlighting the value of platforms like Twitter and Mastodon for sharing and receiving information.We also dive into:the unique challenges of crafting effective signaturesthe specifics of malware, focusing on Vidar stealer and highlighting the dynamic nature of Vidar's command and control infrastructurethe distribution methods of these malware strains, from email campaigns to unconventional tactics like using video game platforms and social media for luring victimsResources mentioned:Intro to Traffic Analysis w/ Issac ShaughnessyEmerging Threats Mastodon: https://infosec.exchange/@emergingthreatsThreat Insight Mastodon: https://infosec.exchange/@threatinsightVidar Stealer Picks Up Steam!For more information, check out our website.

10 snips
Feb 20, 2024 • 47min
From Attribution to Advancement: Red Canary’s Katie Nickels Tackles CTI’s Biggest Questions
Join the conversation with Katie Nickels as she discusses career growth in threat intelligence, attribution challenges, and avoiding burnout in cybersecurity. Dive into communication hurdles, marketing of threat actors, and strategic incident handling approaches.

Feb 6, 2024 • 56min
Beyond the Headlines: Reporting on Sensitive Cybersecurity Topics to Resonate with Everyone
Send us fan mail!*This episode contains content warnings of suicide and self-harm* “It’s not about preventing something from happening, it’s being prepared for when it does.” This episode is filled with stories from the different scenarios that have been plaguing people with cyber security attacks. Today’s guest is Kevin Collier, a cybersecurity reporter at NBC. He joins us to discuss his experiences covering cybersecurity stories for a mainstream audience. As the first and only dedicated cybersecurity reporter at NBC, Collier reflects on the evolving nature of media coverage in the cybersecurity space, emphasizing the increasing need for dedicated coverage in major news publications. He highlights the rise of scams facilitated through text messages, emails, and zero-day exploits, emphasizing the geopolitical circumstances that enable these threats, and also helping audiences understand the reality behind the cyber threats they face.They also dive into:The poignant reporting process on a story of pig butchering scamsThe normalization of cyber threats, such as ransomware, and the role of the media in shaping public perceptionThe process of convincing stakeholders to prioritize certain topicsThe emotional toll of reporting on sensitive cybersecurity topics and the importance of self-care in navigating this challenging intersection.Resources mentioned: trigger warning for content of suicide and self-harm“Online romance scams are netting millions of dollars — and pushing some to self-harm” by Kevin CollierDiscarded Episode with Tim UtzigColonial Pipeline Blog by CISA.govFor more information, check out our website.

Jan 23, 2024 • 1h 6min
Strategies for Defense and Disruption: Part Two of Predicting Cyber Threats in 2024
Send us fan mail!Is 2024 the year of adaptability and collaboration within the security community? Let’s hope so!Today’s episode is Part Two of what to expect in cybersecurity in 2024, and our guests are Randy Pargman and Rich Gonzalez. Randy sheds light on the crucial role of the Detections Team and emphasizes the constant innovation of malware authors, and the team’s mission to outsmart them. Rich discusses the Emerging Threats team and dives into open source and paid resources as force multipliers for security teams.While some reflections were shared about 2023, namely multiple high-profile vulnerability events and the challenges posed by QR codes, the conversation focused on the upcoming year. They anticipate increased creativity from threat actors, and emphasize the constant battle between red and blue teams. The conversation underscores the need for constant adaptation, response to emerging threats, and collaboration within the security community.Other topics discussed include:Incidents like WinRAR, Citrix NetScaler ADC, and ScreenConnect vulnerabilitiesThe positive impact of public-private partnerships and international cooperation in enhancing cybersecurity defensesHopeful vision for the industry, advocating for understanding, education, & increased diversityFor more information, check out our website.

Jan 9, 2024 • 45min
Phishing, Elections, and Costly Attacks: Part One of Predicting Cyber Threats in 2024
Send us fan mail!To move forward, it’s good to take a minute and reflect on what’s happened. Today’s episode focuses on insights from Daniel Blackford and Alexis Dorais-Joncas, both Senior Managers of Threat Research at Proofpoint. This is the first in our two-part series looking at what’s on the horizon for 2024.Reflecting on 2023, they discuss the use of QR codes, major technique shifts from the biggest ecrime and APT actors, and the ongoing problem of ransomware.Looking ahead to 2024, the emphasis goes to the gradual shift of attacks outside corporate-managed infrastructure, leveraging personal email accounts to bypass extensive security measures. On the cybercrime side, there’s a prediction of the continued development of as-a-service models, particularly focusing on traffic distribution services, leading to more modular and challenging-to-attribute attack chains.They also dive into:Threat actor activity during the elections and OlympicsSpecific threat actor groups that caught their attention in 2023, TA473 and TA577Living off the Land conceptsFor more information, check out our website.

Dec 26, 2023 • 1h 5min
Jingle Bells, Phishing Tales: Reflecting on Cybersecurity in the Holiday Spirit
Send us fan mail!In this special Holiday edition of Discarded, the tables are turned with hosts, Selena and Crista, becoming the answer-ers, our returning Moderator, Mindy Semling, as the question asker, and our wonderful audience is transformed into Cyber Elves. This conversation is lively and filled with questions from a variety of engaged audience members. (Thank you to everyone who contributed). Questions range from career advice for aspiring Cyber Threat Analysts, to certain threats exploding in popularity, to a reflection of 2023. The Discarded Podcast team would like to take a moment and thank the following people for their contributions to the Cyber Security Landscape this year:Pim TrouerbachKelsey MerrimanTommy MadjarBryan CampbellGreg LesnewichKyle EatonJoe WiseEmerging Threats teamThe overall Proofpoint Team, including, but not limited to our PR and marketing teamsResources mentioned:Youtube: Katie Nickels Sans Threat Analysis Rundownhttps://www.sans.org/cyber-security-courses/cyber-threat-intelligence/https://www.networkdefense.co/courses/investigationtheory/https://www.nbcnews.com/tech/tech-news/how-online-romance-scams-netting-millions-self-harm-rcna85252https://medium.com/mitre-attack/attack-v14-fa473603f86bhttps://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9ahttps://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/https://www.wired.com/story/gadget-lab-podcast-621/https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/For more information, check out our website.

Dec 12, 2023 • 51min
I Know This Might Sound Crazy but Russia’s TA422 Blasted Lots of Exploits
Send us fan mail!Tis the season for understanding TA422’s latest activity AND for singing podcast guests!Today’s returning guest is Greg Lesnewich, Senior Threat Researcher at Proofpoint. He sheds light on the tactics, techniques, and procedures (TTPs) employed by TA422. The conversation touches on the significance of the high volumes observed starting in late summer, the exploitation of vulnerabilities for NTLM credential harvesting, and the brief usage of the WinRAR vulnerability.They touch upon the potential reasons behind the group's choices, considering factors such as resourcing, tactical decisions, and a shift towards speed and efficiency. There is also consideration about connecting TA422's activities to broader trends in threat actor behavior, such as a shift towards living off the land techniques and a focus on social engineering for initial access.The conversation continues on the following topics:[11:17] TA422 Recent Activity[13:30] Campaign’s using CVE 2023 23397[18:35] Winrar activity[22:50] October & November activity[26:50] Guest Singing Spotlight[29:30] Noticeable differences in campaignsResources mentioned:TA422 Proofpoint Blog: https://www.proofpoint.com/us/blog/threat-insight/ta422s-dedicated-exploitation-loop-same-week-after-weekGoogle TAG Report on WinRAR Exploits: https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/amp/Selena’s Cyber Tunes Playlist: https://open.spotify.com/playlist/7GqH7SefgiI1UtYNjQ5svg?si=vO2Ao-lTTSuCCVfgfgcUfw&pt=97da5ebbd320a4f79014b1f205fc8438&pi=u--xbfwSuHSE-TWired story on Sandworm: https://www.wired.com/story/sandworm-ukraine-third-blackout-cyberattack/For more information, check out our website.

Nov 29, 2023 • 51min
MITRE ATT&CK Evolves with Cyber Threat Sophistication
Send us fan mail!Take a deep dive with us into the incomparable MITRE ATT&CK Framework, a comprehensive knowledge base that catalogs real-world threat actor behaviors derived from threat intelligence. Today’s guests are our great friends at MITRE ATT&CK, Adam Pennington (Attack Lead), and Patrick Howell O’Neill, (Lead Cyber Operations Analyst). They explore how the Framework serves as a common language for communicating adversary threat behaviors and discuss its evolution from an internal project to a community-driven resource.The latest version of the MITRE ATT&CK Framework version 14 was released on Halloween, emphasizing new features like the addition of new defensive information and techniques they previously said no to including. They discuss the decision-making process behind incorporating new techniques, such as Financial Theft, Impersonation, Phishing: Spearphishing Voice, and Phishing for Information: Spearphishing Voice.The conversation continues on the following topics:[5:00] MITRE ATT&CK Framework[9:25] Improving cybersecurity detection[13:00] New ATT&CK techniques[16:00] Decisions about which techniques to add[23:00] Mobile ATT&CK[30:00] Decisions about which trends to include[37:00] Feedback about the FrameworkResources mentioned:What is the MITRE ATT&CK Framework?https://attack.mitre.org/ https://medium.com/mitre-attack/attack-v14-fa473603f86bFor more information, check out our website.

Nov 14, 2023 • 23min
Looking Behind the Curtain at the Palestinian-Aligned TA402
Send us fan mail!While the current Israeli/Palestinian conflict is on everyone’s minds, how many are thinking about the repercussions of cyber security? Today’s guest is returning guest, Joshua Miller, Senior Threat Researcher on the APT team at Proofpoint. While he focuses on different Middle East, North African state-aligned threats, he is talking today about a Palestinian-aligned threat group coined TA402.While there is no direct link to Hamas, their activities support the Palestinian Territories. Joshua paints a vivid picture of TA402's usual targets, strategies, and tactics, highlighting their geofencing techniques and their crafty use of compromised government agency accounts. The recent evolution of their attack chain, involving Dropbox and DLL side loading, is dissected in intricate detail, offering a glimpse into the evolving landscape of cyber threats.This discussion not only provides insights into TA402's modus operandi but also emphasizes its distinctiveness from its previous malware campaigns. TIMESTAMPS[1:35] Length of time tracking TA402[3:00] Differences between known government threat actors vs TA402[7:00] Other groups involved in the Israeli/Palestinian War[10:40] Normal victimology from this type of threat actor[12:30] Comparison of tactics that TA402 is deploying[19:20] Difficulties in tracking TA402Resources mentioned:Ugg Boots 4 Sale: A Tale of Palestinian-Aligned EspionageNew TA402 Molerats Malware Targets Governments in the Middle Easthttps://malpedia.caad.fkie.fraunhofer.de/actor/aridviper https://www.proofpoint.com/us/blog/threat-insight/exploiting-covid-19-how-threat-actors-hijacked-pandemic For more information, check out our website.

Oct 31, 2023 • 32min
Unmasking the Tricksters: The World of Fake Browser Updates
Send us fan mail!How can you tell when a website (yes, a website) is compromised? These threats are pretty crafty because they aren't out to target specific individuals; they just wait for folks like you and me to innocently click on compromised websites during our regular browsing. But these threats don't stop at casual browsing. They sneak into emails, social media, search engines, and even web alerts. They're like chameleons, adapting to different situations.Our guest today is Dusty Miller, a Threat Detection Analyst at Proofpoint. He identifies four key groups: SocGholish, RogueRaticate/FakeSG, ZPHP/SmartApeSG, and ClearFake. Each has its own style and tricks, but they all love using that tempting fake browser update ruse.These threats work because they exploit our trust in websites we've visited before. Users tend to trust websites they've visited before, making them more susceptible to clicking on fake browser update prompts.Responding to these threats isn't a walk in the park for defenders. To tackle them effectively, you need to pinpoint which specific threat you're dealing with and respond accordingly. It's like playing a game with multiple rulebooks; you've got to know which one you're up against.TIMESTAMPS[1:45] Fake Browser Opportunities[5:00] Threat Actors Using Malware[9:00] Browser Malware Clusters & Tactics[18:00] Combating Fake Updates[19:00] Naming New Malware[28:00] Why These ThreatsResources mentioned:Dr. Bob Hausmann Episode“Are You Sure Your Browser is Up to Date?...” by Dusty MillerFor more information, check out our website.


