Episode Details

Back to Episodes
Deep Dive - APT Sand Eagle

Deep Dive - APT Sand Eagle

Season 1 Episode 32 Published 1ย year, 8ย months ago
Description

๐ˆ๐ฌ ๐ญ๐ก๐ž ๐’๐š๐ง๐ ๐„๐š๐ ๐ฅ๐ž ๐€๐๐“ ๐ญ๐ก๐ž ๐‰๐š๐ฌ๐จ๐ง ๐๐จ๐ฎ๐ซ๐ง๐ž ๐จ๐Ÿ ๐œ๐ฒ๐›๐ž๐ซ-๐š๐ญ๐ญ๐š๐œ๐ค๐ฌ? ๐Ÿ•ถ๏ธ

ย 

Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines ๐Ÿ“ฐ for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market โ€“ iPhones. ๐Ÿ“ฑ



From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal โ€“ cyber espionage.Host Lieuwe Jan Koning is joined by Martijn Peijer (Cybersecurity Expert SOC at the Dutch Tax Office) and Rob Maas (Field CTO at ON2IT) for this break down on how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development.

๐ŸŽง ๐“๐ฎ๐ง๐ž ๐ข๐ง ๐ญ๐จ ๐ž๐ฉ๐ข๐ฌ๐จ๐๐ž 32 ๐จ๐Ÿ ๐“๐ก๐ซ๐ž๐š๐ญ ๐“๐š๐ฅ๐ค๐ฌ! ๐ŸŽง

ย 

๐Ÿ“ˆ Find our infographics and receive your own ๐Ÿ‘• Threat Talks T-shirt: threat-talks.com ย 

ย 

๐Ÿ•ต๏ธ Threat Talks is a collaboration between ON2IT and AMS-IX

#cybersecurityexperts #threatintelligence #zeroday #threattalks

Listen Now

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us