meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

The double-edged sword of cyber espionage. [Research Saturday]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 11 May 2024

⏱️ 19 minutes

🧾️ Download transcript

Summary

Dick O'Brien from Symantec Threat Hunter team is discussing their research on “Graph: Growing number of threats leveraging Microsoft API.” The team observed an increasing number of threats that have begun to leverage the Microsoft Graph API, usually to facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services. The research states "the technique was most recently used in an attack against an organization in Ukraine, where a previously undocumented piece of malware used the Graph API to leverage Microsoft OneDrive for C&C purposes." The research can be found here: Graph: Growing number of threats leveraging Microsoft API

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:10.0

And now a message from Cyberbit.

0:15.0

Mastering Cybersecurity is like mastering a sport.

0:18.0

You build muscle memory through rigorous practice,

0:21.0

then you train as a team to foster cohesion while operating under pressure.

0:26.1

Like athletes, cybersecurity professionals thrive on hands-on simulation, but traditional courses,

0:32.0

certifications, and open source labs won't build you a winning team.

0:36.9

You need Cyberbit. Cyberbit offers a hyper-realistic simulation environment for your

0:42.0

sock,

0:42.9

I-R, and C-suite to refine your skills,

0:46.1

all using the market-leading Sims, EDRs,

0:49.2

firewalls, and wafts they use every day.

0:52.6

Cyberbit is offering Cyberwire listeners of free live fire exercise.

0:57.6

Sign up your team now at Cyberbit.com slash cyberwire. Hello everyone and welcome to the CyberWire's research Saturday.

1:19.4

I'm Dave Bitner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities,

1:26.8

solving some of the hard problems and protecting ourselves in a rapidly evolving cyberspace.

1:32.6

Thanks for joining us.

1:34.0

We discovered a previously unknown piece of malware.

1:40.0

We discovered a previously unknown piece of malware which we have called Birdie

1:46.3

client because we think the attackers themselves called it Birdie client and it initially got our attention because it was submitted from Ukraine which is

1:58.1

always interesting given what's going on there at the moment.

2:02.1

That's Dick O'Brien, a principal intelligence analyst with Symantec's threat hunter team.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.