4.8 • 1K Ratings
🗓️ 28 November 2023
⏱️ 32 minutes
🧾️ Download transcript
In August 2021, a port in Houston, Texas, was attacked. Over the following months, a series of attacks occurred in various locations, reminiscent of a serial killer's pattern. Targets included telecommunications companies, government agencies, power plants, and water treatment facilities. How did Volt Typhoon manage to evade authorities and analysts for such an extended period?
Click on a timestamp to play from that location
0:00.0 | Hi, I'm Ryan Levy. |
0:01.0 | Welcome to Cyber reasons Malicious Life. 15 years ago a number of high-profile Tibetan monks received the same innocent seeming |
0:36.7 | nondescript email. |
0:38.7 | Yes, monks sometimes have email. |
0:41.9 | Those who clicked the attached dock or PDF files now loaded a Trojan |
0:46.6 | horse which often led to a second malware, Ghost Rat. Ghost Rat undpend the Ghost Net operation we discussed on this podcast a couple of years back, in which China |
0:59.2 | spied on economic, political and media targets in over 100 countries. |
1:04.8 | It worked by taking advantage of vulnerabilities in Microsoft Office and Adobe Acrobat, |
1:11.2 | often flying under the radar, but sometimes causing a flash on screen or outright |
1:16.5 | crashing an application. |
1:18.9 | The result, though, was powerful, enabling China to download further malware, steal documents, or simply spy on their targets |
1:27.3 | via their keyboards, microphones, and webcams. camps. |
1:39.0 | This generally is how most of us think of hacking. An infection vector, usually simple social engineering, followed by different stages of malware, which allow |
1:46.2 | an attacker to establish persistence, move laterally, and cause further actions in a host computer or network. |
1:55.0 | In recent years, though, hacking has started to not look like this in some meaningful ways. |
2:02.0 | Cyber attackers, particularly the most advanced nation-state level |
2:06.2 | APTs, have made a characteristic shift in their tactics. Their new favorite strategy is changing the ballgame not just for them, but for their |
2:16.8 | victims and the people trying to defend those victims. To demonstrate, we're going to focus on one recent case study. |
2:26.0 | The origin story for us goes back to August of 2021, where there was disclosure on an attack on in a port in Houston. |
2:37.0 | John Lambert is a security fellow and corporate vice president at Microsoft who founded the Microsoft Threat Intelligence team. |
2:46.1 | Two years ago his threat research operation was called in to analyze the forensic data |
2:52.4 | left over from a cyber attack against a port. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.