Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • mikebrashier
    mikebrashier at June 22,2016
    How did they get that screen cap video? I had never heard of the Mandiant Report before watching this video. I am impressed that they essentially hacked the hacker in order to get a video log of his process and procedures. I wonder if they used the various IP's therein to hack the bad actors other servers. Is there an authoritative number of the economic cost of chinese hacking of american corporations? I would guess that companies are reluctant to admit that they have been hacked and had information stolen.
  • Modasiya
    Modasiya at July 27,2016
    Looks like now a days its not required to be a good programmer to hack any system. Just look for appropriate tools, learn how to work with it, design the plan and you are good to go !
  • asdfaslkjadsfasdasdfas
    asdfaslkjadsfasdasdfas at September 27,2016
    I found it very odd how little it seemed this actor worked to disguise their true location. I feel like a more sophisticated threat would have obtained a phone number that points to US territory and not shanghai to set up the gmail accounts with. I also found it strange that they openly interacted with resources with ip addresses in shanghai. I also question the incentives behind a company releasing this report that is actively participating in acquisition talks. It seems like not enough questions are asked about authenticity in scenarios like this, which may reflect the USG's tendency to blame china. A tendency which other state actors could then exploit. If you watch this video under the assumption that it's actually a Venezuelan state actor, the hacker seems much more clever.
  • BBurgess
    BBurgess at September 30,2016
    I agree with most of the peoples comments on here. This video raises more questions and makes me wonder about the back ground of the video. How did Mandiant come about getting access to see the APT hackers actions? Not to mention this was released months before FireEye acquired Mandiant. Without scrutinizing the origins of the video and knowing the background, one could easily see how this could be a publicity generating release, timed perfectly with acquisition talks with FireEye. None the less it is a interesting video and studying the techniques used by foreign actors infiltrating our systems would be very beneficial in defeating our enemies abroad.
  • kbacon5
    kbacon5 at October 16,2016
    Very interesting video and like others commented before I wonder how they were able to capture this hackers screen. I agree with you Ronald about the phone number piece. Very interesting point also regarding if it was assumed the hacker is a Venezuelan. Also, I have never used a remote access trojan or seen a video on it but after watching this it seems like they are created to be pretty easy to use. That is worrisome since so many people, including people with bad intentions, have access to the internet now.
    • «
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved