Listen "Waiting for their victims."
Episode Synopsis
Bitdefender researchers have recently found the APT group StrongPity has been targeting victims in Turkey and Syria. Using watering hole tactics to selectively infect victims and deploying a three-tier C&C infrastructure to thwart forensic investigations, the APT group leveraged Trojanized popular tools, such as archivers, file recovery applications, remote connections applications, utilities, and even security software, to cover a wide range of options that targeted victims might be seeking.
Joining us on this week's Research Saturday to discuss the research is Bitdefender's Liviu Arsene.
You can find the research here:
StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure
Learn more about your ad choices. Visit megaphone.fm/adchoices
Joining us on this week's Research Saturday to discuss the research is Bitdefender's Liviu Arsene.
You can find the research here:
StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure
Learn more about your ad choices. Visit megaphone.fm/adchoices
More episodes of the podcast Research Saturday
Excel-lerating cyberattacks.
27/12/2025
The lies that let AI run amok.
20/12/2025
Root access to the great firewall.
13/12/2025
When macOS gets frostbite.
06/12/2025
A new stealer hiding behind AI hype.
29/11/2025
Two RMMs walk into a phish…
22/11/2025
When clicks turn criminal.
15/11/2025
A fine pearl gone rusty.
08/11/2025
Attack of the automated ops.
01/11/2025
A look behind the lens.
25/10/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.