aholcom2at November 14,2015 I have always enjoyed reading Mandiants/FireEyes APT reports about the latest malware campaigns. This was a very cool video showing how Chinese hackers hack into victim computers. One thing that confused me in this video is whether the person on the computer is the actual hacker, and if so how is Mandiant viewing the computer and how is that legal?, or is it simply another Mandiant employee impersonating the hacker.
tshafiat November 15,2015 This video is very revealing as to the level of sophistication that these hackers have. I am impressed by this and want to learn more about it. I am further inspired to learn about ethical hacking and set up of my own hacking test network system.
busterhaxat November 27,2015 Interesting to see whats going on on the back end of things like this.
haygaffat December 19,2015 Even the bad guys have set backs. They just kept coming. Smart move to uninstall the software on the machine after use. The USG over the years has stepped its game to try to keep up with the growing threat of other host countries cyber attack and intelligence forces but this is a never ending battle. The battle lines will continue to get blurred as technology gets better and better.
BrianDaugetteat January 25,2016 This is a really interesting video and I wonder how Mandiant was able to observe the hacker's activity. Now that this video is a few years old it would interesting to see Mandiant put out another one in which they detail how or if the APT 1 actors have changed their tactics since the release of the APT 1 report and this video. Do they still use Gmail, lightbolt, ghostrat, etc., or have they moved on to other tools. Do they use different IP addresses now, and how have they changed how they manage their hop point infrastructure, if at all?
This is also a really good PR piece for Mandiant, and started the trend of commercial companies putting out Cyber threat reports on State sponsored actors/tools.