Deep Dive - APT Sand Eagle

27/08/2024 22 min Temporada 1 Episodio 32
Deep Dive - APT Sand Eagle

Listen "Deep Dive - APT Sand Eagle"

Episode Synopsis


๐ˆ๐ฌ ๐ญ๐ก๐ž ๐’๐š๐ง๐ ๐„๐š๐ ๐ฅ๐ž ๐€๐๐“ ๐ญ๐ก๐ž ๐‰๐š๐ฌ๐จ๐ง ๐๐จ๐ฎ๐ซ๐ง๐ž ๐จ๐Ÿ ๐œ๐ฒ๐›๐ž๐ซ-๐š๐ญ๐ญ๐š๐œ๐ค๐ฌ? ๐Ÿ•ถ๏ธ
ย 
Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines ๐Ÿ“ฐ for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market โ€“ iPhones. ๐Ÿ“ฑ


From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal โ€“ cyber espionage.Host Lieuwe Jan Koning is joined by Martijn Peijer (Cybersecurity Expert SOC at the Dutch Tax Office) and Rob Maas (Field CTO at ON2IT) for this break down on how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development.

๐ŸŽง ๐“๐ฎ๐ง๐ž ๐ข๐ง ๐ญ๐จ ๐ž๐ฉ๐ข๐ฌ๐จ๐๐ž 32 ๐จ๐Ÿ ๐“๐ก๐ซ๐ž๐š๐ญ ๐“๐š๐ฅ๐ค๐ฌ! ๐ŸŽง
ย 
๐Ÿ“ˆ Find our infographics and receive your
own ๐Ÿ‘• Threat Talks T-shirt: threat-talks.com ย 
ย 

๐Ÿ•ต๏ธ Threat Talks is a collaboration between ON2IT and AMS-IX


#cybersecurityexperts #threatintelligence #zeroday #threattalks