-
aholcom2
at November 14,2015
I have always enjoyed reading Mandiants/FireEyes APT reports about the latest malware campaigns. This was a very cool video showing how Chinese hackers hack into victim computers. One thing that confused me in this video is whether the person on the computer is the actual hacker, and if so how is Mandiant viewing the computer and how is that legal?, or is it simply another Mandiant employee impersonating the hacker.
-
tshafi
at November 15,2015
This video is very revealing as to the level of sophistication that these hackers have. I am impressed by this and want to learn more about it. I am further inspired to learn about ethical hacking and set up of my own hacking test network system.
-
busterhax
at November 27,2015
Interesting to see whats going on on the back end of things like this.
-
haygaff
at December 19,2015
Even the bad guys have set backs. They just kept coming. Smart move to uninstall the software on the machine after use. The USG over the years has stepped its game to try to keep up with the growing threat of other host countries cyber attack and intelligence forces but this is a never ending battle. The battle lines will continue to get blurred as technology gets better and better.
-
BrianDaugette
at January 25,2016
This is a really interesting video and I wonder how Mandiant was able to observe the hacker's activity. Now that this video is a few years old it would interesting to see Mandiant put out another one in which they detail how or if the APT 1 actors have changed their tactics since the release of the APT 1 report and this video. Do they still use Gmail, lightbolt, ghostrat, etc., or have they moved on to other tools. Do they use different IP addresses now, and how have they changed how they manage their hop point infrastructure, if at all?
This is also a really good PR piece for Mandiant, and started the trend of commercial companies putting out Cyber threat reports on State sponsored actors/tools.