-
hanna88
at September 30,2015
Loved the provided screen shots and computer video that followed the narration. I wasn't sure about some of the technical details as to how exactly he was completing his mission, but definitely got the gist of what he was after and the general process for acquiring it. Short but informative!
-
Faisal817
at October 01,2015
This video proves for us how dangerous nowadays is China. Every single day I see a new attack with new technique that coming from China. What does that mean? Aren't we smart enough to secure ourselves or we don't have the knowledge of security?
-
brober15
at October 05,2015
I was a little surprised that Gmail doesn't have some way to detect that someone is using one of their accounts for spear phishing. Surely the activity is different from someone legitimately using email. I guess hackers would just figure out a workaround and whatever Google set up would make life difficult for everyone else.
-
gcorker
at October 09,2015
The video had good info, but it was really quick. Another person pointed out the link to the full report intelreport.mandiant.com/Mandiant_APT1_Report.pdf. I started going through it, and it is well written. It's worth checking out if you found the video interesting.
-
Beggsse
at November 12,2015
While this is a short overview, I found myself going back multiple times to gain a better overall understanding. It is interesting the multiple options available to try and gain backdoor access including the Ghost Rat using a GUI to interact, and WebC2-Head using a command line to listen for incoming victims through the back door system and the time spent trying and failing to interact with the victim. Once successful using HTRAN to connect with IP addresses and the process to verify prior to uploading stolen files. The process is logical and the actions of those carefully executing them, reveal the stealth, patience and patterns needed to reach their targets and unsuspecting victims.