-
Ahmed
at February 20,2015
it's amaizing how they stablished these methods all together for the attack but i think mandiant did a great job to figure out the exact details(tools, ip addresses and even hardware) of the crime.
-
DPerry
at February 21,2015
Connellyt: good point - definitely could use some insight Thanks for the link. It is definitely interesting just how simple it can be to do absolutely anything given the knowledge of an existing tool. Even a complete lack of understanding today can be remedied by a mere ability to search properly.
-
kcn278
at February 26,2015
Nice detailed video, makes me wonder how long did the APT hacker remain undetected for. I like what the hacker did with the input when making the account and the logic process of extracting the stolen files.
-
Jmurray8
at March 10,2015
Great practical discussion and presentation on hacker tools and methods as described in Mandiant APT1. Very rapid presentation,
-
skatakam
at March 14,2015
Mandiant is awesome,
According to Mandiant, Ugly Gorilla, DOTA and SuperHard – as the actors have been named – made “poor operational security choices,” allowing them to track their activities.
http://news.softpedia.com/news/Hackers-Working-for-Chinese-Military-Ugly-Gorilla-DOTA-SuperHard-330773.shtml