Chinese APT hackers remotely controlling a victim.
Ahmedat February 20,2015 it's amaizing how they stablished these methods all together for the attack but i think mandiant did a great job to figure out the exact details(tools, ip addresses and even hardware) of the crime.
DPerryat February 21,2015 Connellyt: good point - definitely could use some insight Thanks for the link. It is definitely interesting just how simple it can be to do absolutely anything given the knowledge of an existing tool. Even a complete lack of understanding today can be remedied by a mere ability to search properly.
kcn278at February 26,2015 Nice detailed video, makes me wonder how long did the APT hacker remain undetected for. I like what the hacker did with the input when making the account and the logic process of extracting the stolen files.
Jmurray8at March 10,2015 Great practical discussion and presentation on hacker tools and methods as described in Mandiant APT1. Very rapid presentation,
skatakamat March 14,2015 Mandiant is awesome,
According to Mandiant, Ugly Gorilla, DOTA and SuperHard – as the actors have been named – made “poor operational security choices,” allowing them to track their activities.