logo
episode-header-image
Sep 2023
32m 16s

Enter Sandman. A look at an initial acce...

N2K Networks
About this episode

A new APT is found: enter Sandman. Tracking an initial access broker called Gold Melody. Iran’s OilRig group is active against Israeli targets. Cyber ops as an instrument of soft power. Recovery and investigation in the casino ransomware attacks. In our Solutions Spotlight, Simone Petrella speaks with MK Palmore from Google Cloud about talent retention and the cybersecurity skills gap. Our guest is Kristen Marquardt of Hakluyt with advice for cyber startups. And Bermuda points to Russian threat actors.


For links to all of today's stories check out our CyberWire daily news briefing:

https://thecyberwire.com/newsletters/daily-briefing/12/182


Selected reading.

Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit (SentinelOne)

GOLD MELODY: Profile of an Initial Access Broker (Secureworks)

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes (We Live Security)

Cyber Soft Power | China's Continental Takeover (SentinelOne)

MGM Resorts computers back up after 10 days as analysts eye effects of casino cyberattacks (AP News)

MGM Restores Casino Operations 10 Days After Cyberattack (Dark Reading)

MGM Resorts computers back up after being down 10 days due to casino cyberattacks (CBS News)

MGM says its recovered from cyberattack, employees tell different story (Cybernews)

'Power, influence, notoriety': The Gen-Z hackers who struck MGM, Caesars (Reuters)

Apple emergency updates fix 3 new zero-days exploited in attacks (BleepingComputer) 

Russia linked to cyberattack on government services (Royal Gazette)

Learn more about your ad choices. Visit megaphone.fm/adchoices

Up next
Today
No honor among thieves. [Research Saturday]
John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. Once united through Ransomware-as-a-Service programs, ... Show More
25m 3s
Yesterday
When the breachers get breached.
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in applica ... Show More
28m 50s
Oct 9
Cyber defenders pulled into deportation duty.
DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its ... Show More
29m 49s
Recommended Episodes
Feb 2021
Nicole Perlroth, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" (Bloomsbury, 2021)
For years, cybersecurity experts have debated whether cyber-weapons represent a destabilizing new military technology or merely the newest tool in the spies’ arsenal. In This Is How They Tell Me the World Ends (Bloomsbury, 2021), Nicole Perlroth makes a compelling case that cyber ... Show More
59m 4s
Mar 2023
How A Satellite Hack Became a Cybersecurity Wakeup Call
People around the world rely on satellites for their internet connections, credit card transactions–and even to keep track of time.  Last year, a suspected Russian-led satellite hack exposed how vulnerable they are to security breaches, from individual hackers seeking to pilfer i ... Show More
31m 54s
Apr 2021
The Story Behind The SolarWinds Cyberattack
Last year, hackers believed to be directed by the Russian intelligence service, the SVR, slipped a malicious code into a routine software update from a Texas- based company called SolarWinds. They then used it as a vehicle for a massive cyberattack against America and successfull ... Show More
14m 2s
Dec 2022
Babbage: The surprising ineffectiveness of Russia’s cyber-war
When Russia invaded Ukraine, for the first time ever, two mature cyber-powers began to fight over computer networks in wartime. But while Russia’s cyber-war may have been intense, its impact has been modest. Has the country’s cyber prowess been overrated? The Economist’s Benjamin ... Show More
36m 46s
Mar 2022
Thu. 03/31 – Hackers Forging Emergency Data Requests
Another day of all the hacking news. Now the hackers are forging Emergency Data Requests. Apparently there have been vulnerabilities in Wyze security cameras that no one bothered to fix. TSMC warns of a tech slowdown. Masa Son orders his lieutenants to slow down investing just a ... Show More
16m 22s