Episode Details
Back to Episodes
Deep Dive - APT Sand Eagle
Description
๐๐ฌ ๐ญ๐ก๐ ๐๐๐ง๐ ๐๐๐ ๐ฅ๐ ๐๐๐ ๐ญ๐ก๐ ๐๐๐ฌ๐จ๐ง ๐๐จ๐ฎ๐ซ๐ง๐ ๐จ๐ ๐๐ฒ๐๐๐ซ-๐๐ญ๐ญ๐๐๐ค๐ฌ? ๐ถ๏ธ
ย
Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines ๐ฐ for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market โ iPhones. ๐ฑ
From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal โ cyber espionage.Host Lieuwe Jan Koning is joined by Martijn Peijer (Cybersecurity Expert SOC at the Dutch Tax Office) and Rob Maas (Field CTO at ON2IT) for this break down on how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development.
๐ง ๐๐ฎ๐ง๐ ๐ข๐ง ๐ญ๐จ ๐๐ฉ๐ข๐ฌ๐จ๐๐ 32 ๐จ๐ ๐๐ก๐ซ๐๐๐ญ ๐๐๐ฅ๐ค๐ฌ! ๐ง
ย
๐ Find our infographics and receive your own ๐ Threat Talks T-shirt: threat-talks.com ย
ย
๐ต๏ธ Threat Talks is a collaboration between ON2IT and AMS-IX
#cybersecurityexperts #threatintelligence #zeroday #threattalks