DiscoverState of the HackS2E06: APT41 - Double Dragon: The Spy Who Fragged Me
S2E06: APT41 - Double Dragon: The Spy Who Fragged Me

S2E06: APT41 - Double Dragon: The Spy Who Fragged Me

Update: 2019-08-14
Share

Description

This is our APT group graduation party for APT41: Double Dragon,
conducting both Chinese state-sponsored espionage activity and
personal financially-motivated activity. You've read the report* and
on this episode, Christopher Glyer and Nick Carr go behind-the-scenes
with two technical experts, Jackie O'Leary and Ray Leong, who worked
for months to produce the report. We answer viewer questions and
discuss sifting years of incident response data, peppered with Glyer's
IR war stories, and fascinating malware and techniques analyzed by our
reverse engineers in FLARE. Ray and Jackie share their experiences
with the threat group and challenges in the graduation process. We
cover what makes them sophisticated and deep-dive on their supply
chain attacks & guardrails, passive & cross-platform backdoors,
rootkits & bootkits, legit services usage, and third party access via
TeamViewer.

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

S2E06: APT41 - Double Dragon: The Spy Who Fragged Me

S2E06: APT41 - Double Dragon: The Spy Who Fragged Me

helena.davis@fireeye.com