DISCARDED: Tales From the Threat Research Trenches

Proofpoint
undefined
Jul 25, 2023 • 36min

An Apple a Day Won't Keep Iranian APT Away: How TA453 Targets Macs

Send us fan mail!What is new with Iranian actor TA453, and what is happening with their attack chains? To answer these questions, today’s guest is Joshua Miller, a Senior Threat Researcher on the APT team at Proofpoint. Since his last visit, Joshua has published new research on TA453, highlighting new malware and social engineering techniques, which can be found here.Join us as we discuss the following:[1:25] What’s new with threat actor T453[2:35] Multi Persona Impersonation[6:25] Use case of LNKs in the attack chain[8:10] Use of free cloud services[11:15] Attacking different operating systems[16:15] Convoluted attack chains[27:40] Collaborating with researchers, like DropboxFor more information, check out our website.
undefined
Jul 11, 2023 • 43min

Threats and Risks in the Global South

Send us fan mail!When researching cyber threats, there is a bias towards to the West and most of Europe. But what about the global majority?Today’s guest is Martijn Grooten, a Digital Security Threat Analyst with Internews. With 16 years of experience in cybersecurity, he has recently focused on the impact of security for at risk groups and people. Join us as we discuss the following:Outdated ideas of security for the general publicCommon trends geographicallyThe distinction of threats between devicesFor more information, check out our website.Resources:Martijn’s BotConf talk: https://youtu.be/CcqOy6WdUjwMartijn on social media: Twitter, Mastodon, LinkedIn
undefined
Jun 27, 2023 • 37min

Weird & Wacky Researcher Summer: The Artifacts & Detections Edition

Send us fan mail!It's shaping up to be a weird and wacky summer for threat researchers.While it’s been quieter on the front end, there are still many stories to share with some weird and wacky incidents. This episode also includes a fun, dramatized read of an email tactic. Join us as we discuss the following:Where the team identifies on the Cyber Alignment ChartUse of celebrity names within email luresRecent PDF anticsUpdates about activity from current threat actorsFor more information, check out our website!
undefined
Jun 14, 2023 • 44min

It's Summertime: What’s the E-crime Vibe?

Send us fan mail!Who’s quiet and who’s making noise? What’s the backchannel chatter over at Proofpoint?Proofpoint threat researchers Joe Wise and Pim Trouerbach join this week’s episode to discuss the e-crime vibe for the first half of 2023. Join us as we discuss the following: Emotet’s activity, or lack thereofChaotic vibes from IcedIDTA570 and TA577 setting trends
undefined
May 30, 2023 • 32min

When the Threat Profile is High: Protecting At-Risk Individuals Online

Send us fan mail!How does cybercrime threaten individual reporters? What about an entire newsroom? What if you’re an average person who suddenly becomes the center of a dark conspiracy theory? Welcome to the world of cybersecurity for at-risk individuals. In this episode, renowned cybersecurity expert, Runa Sandvik joins to talk about her work protecting journalists and newsrooms from powerful attackers. Join us as we discuss the following: Protecting personal and corporate devices and accounts for high risk individualsCommon security gaps found in highly targeted organizationsEffectively using cybersecurity toolsCommunicating cybersecurity guidance in the workplaceResources:https://www.reuters.com/business/media-telecom/reuters-reporters-online-accounts-faked-approach-china-activists-2023-02-28/https://www.nbcnews.com/tech/misinformation/tiffany-dover-conspiracy-theorists-silence-rcna69401
undefined
May 16, 2023 • 37min

The Spies and Stalkers of Surveillance Capitalism

Send us fan mail!A brief note on content for today's episode, we are going to be discussing or mentioning stalking, domestic abuse, and sex trafficking in today's show. If you’re a threat actor with a million dollar budget targeting high ranked targets like dissidents, activists, journalists and politicians, how do you do it? What if you’d like to stalk your neighbor, or your ex? In this episode, Proofpoint security research engineer, Chris Talib discusses high-ticket mobile spyware, the proliferation of low-cost stalkerware, surveillance capitalism and why he believes technology can’t solve social problems. Join us as we discuss the following: Mobile spyware toolsThe impact of low cost stalkerwareMoral and ethical implications of developing spywareThe role of governments,organizations and activists in protecting citizen’s right to privacyResources:https://www.laquadrature.net/en/https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/https://www.forbes.com/sites/thomasbrewster/2023/04/06/sex-traffickers-use-parenting-apps-like-life360-to-spy-on-victims/?sh=110a6e2464c3https://www.eff.org/https://tacticaltech.org/https://defensive-lab.agency/https://echap.eu.org/
undefined
May 2, 2023 • 46min

Beyond Banking: IcedID Gets Forked

Send us fan mail!At least three threat actors are ushering in a new era for IcedID, originally classified as banking malware in 2017. In this episode, Proofpoint researchers, Joe Wise and Pim Trouerbach, are here to share their research on the Lite and Forked IcedID variants Join us as we discuss the following:Lite IcedID VariantForked IcedID VariantThe key differences between the variantsWhich operators the Proofpoint team hypothesizes are behind the attacksResources:https://www.proofpoint.com/us/blog/threat-insight/fork-ice-new-era-icedid
undefined
Apr 18, 2023 • 28min

“Did I miss you in Orlando?”: The Rise of SMS Phishing

Send us fan mail!In this podcast episode, Proofpoint senior threat researcher, Adam McNeil, joins us to talk about conversational SMS phishing. These campaigns target mobile devices and often start with a simple, innocuous question. “Are you coming to dinner tomorrow?” can lead to anything from fraud to impersonation to financial schemes and is considered a $3 billion threat. In this episode, we discuss the following: Why a threat actor would choose a conversational SMS campaignDifferent scams associated with conversational SMS phishingLack of awareness surrounding mobile threats
undefined
Apr 7, 2023 • 31min

Staying Ahead of Cloud-Based Threats: Insights on today's threat landscape

Send us fan mail!Cloud threats are a growing concern due to users' and organizations' increasing adoption of cloud computing. It's crucial to develop the skills needed to identify and analyze cloud-based threats and know the latest security tools and techniques to detect, prevent, and respond to cloud-based attacks.Ultimately, security researchers and analysts play a critical role in helping organizations mitigate cloud-related risks and ensure the security of their cloud environments. In this episode, Eilon Bendet, from the Proofpoint cloud threat research team, joins us to discuss the cloud threats he is seeing. In this episode, we discuss the following: Cloud threat Detection and landscape Main objectives for threat actors when they leverage the cloud How users and organization can best protect themselvesAdditional Resources: Cloud Threats & Cloud Threat Landscape https://www.proofpoint.com/us/threat-reference/casb https://www.proofpoint.com/us/corporate-blog/post/dont-let-cloud-threats-rain-your-parade https://www.proofpoint.com/us/corporate-blog/post/microsoft-office-365-attacks-circumvent-multi-factor-authentication-lead-account https://www.proofpoint.com/us/blog/cloud-security/proofpoint-discovers-potentially-dangerous-microsoft-office-365-functionality https://www.proofpoint.com/us/blog/cloud-security/proofpoint-analyzes-potentially-dangerous-functionality-microsoft-sway-enables https://www.proofpoint.com/us/resources/webinars/deep-dive-latest-cloud-threats-microsoft-environments
undefined
Mar 21, 2023 • 32min

Cat-phishing Dogfighters

Send us fan mail!In the cyber threat intelligence and cybersecurity world, there is a growing recognition of the value of professionals with diverse backgrounds and skillsets. While many individuals in the field come from traditional computer science or engineering backgrounds, there is also a trend of people entering the field from unexpected paths. Sarah Sabotka, Senior Threat Researcher at Proofpoint, joins us on this episode to discuss her background in animal cruelty investigations. In this episode, we discuss the following: What a typical day in the life of an animal cruelty investigator looks likeHow Sarah used social engineering and open-source intelligence (OSINT) to build casesHow non-traditional skills and experiences have translated to success in infosecResources: https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36 https://www.mandiant.com/resources/blog/cti-analyst-core-competencies-framework Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app