-
randerson0
at July 21,2015
I want to know how they got this video. This doesn't seem like something you would just hand over.
-
araut
at July 21,2015
How did they see how the gmail was created? and who gives their real phone number while creating an account to be used for spear phishing. This is either a re-enactment mandiant made after doing some reverse engineering or some script kiddie.
-
428Mach1
at July 22,2015
An excellent (and brief) overview for non-technical users of 'the web' alerting and informing them via showing how a hacker - here an actor (that term is used repeatedly throughout the 5 minute video) - establishes a presence to do his nefarious deeds. I was amused (amazed) that the actor provided a call-back number for the Shanghi province. Hmmmmm. Might a co-conspirator perform the set-up stateside ? I`d think that THOSE accounts - associated with a number in China MIGHT be on a "Watch list".
Oh, the APT stands for Advanced Persistent Threat. I like that term and all that it implies. Go to the Mandiant {Fire Eye} site and read the full version of any of their reports.
-
hpasekov
at July 22,2015
I have always thought that one needs to be a good programmer to be able to hack into a computer system; however, it seems that these days, one uses one application to listen to open ports, another application to gain access to the system, and a different application to transfer needed files.
-
bmanahan188
at September 06,2015
Really enjoyed the demonstration of an APT and the descriptions of tools used. This really drives home the point of the danger of APTs and all the methods that they can utilize to get into your systems.