Inside look and lessons from a Recent APT Attack on a U.S. Aerospace Company – John Dwyer – ESW #393
Listeners of the show are probably aware (possibly painfully aware) that I spend a lot of time analyzing breaches to understand how failures occurred. Every breach story contains lessons organizations can learn from to avoid suffering the same fate. A few details make today's breach story particularly interesting:
- It was a Chinese APT
- Maybe the B or C team? They seemed to be having a hard time
- Their target was a blind spot for both the defender AND the attacker
Segment Resources:
Guest
John Dwyer is the Director of Security Research at Binary Defense, where he leads a team of experienced security researchers focused on adversary trend analysis, threat hunting, detection engineering and incident response. John previously served as the Head of Research for IBM X-Force and he’s made several contributions to the security community through his creation of the X-Force MFT Detection and Response Toolkit and the Open Threat Hunt Framework (OTHF). He also served at MIT Lincoln Laboratory and Carnegie Mellon’s Software Engineering Institute.