Oct. 11, 2023
On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Threat Intelligence Analyst Simeon Kakpovi, Intelligence Analyst Lauren Podber, and Senior Hunt Analyst Emiel Haeghebaert. In this episode, Sherrod and guests explore the evolving nature of the Iranian APT group known as "Peach Sandstorm." They discuss how they mature over time while providing valuable insights into APT actors and their evolving strategies. They discuss techniques such as password spraying and the next steps attackers take to establish persistence within the victim's environment. Sherrod also highlights Iran's unique approach to cyber operations, where they exhibit creativity and perseverance in achieving their objectives, even when they may only sometimes be the most technically sophisticated group among nation-state actors. In this episode you’ll learn: The contrast between APT actors and cybercriminals How organizations can protect themselves against password spray attacks The importance for defenders to understand the motivations and tactics of APT actors Some questions we ask: What is the difference between a brute force attack and a password spray attack? How does Iran's cyber capabilities compare to those of other countries? What are some key differences between Iran and APT actors like Russia and China? Resources: How Microsoft Names Threat Actors Peach Sandstorm View Simeon Kakpovi on LinkedIn View Lauren Podber on LinkedIn View Emiel Haeghebaert on LinkedIn View Sherrod DeGrippo on LinkedIn Peach Sandstorm Ingredients: - 1 ripe peach, peeled and pitted - 1 1/2 oz Arak (a traditional Middle Eastern aniseed-flavored spirit) - 1 oz fresh lemon juice - 1 oz rose water - 1/2 oz simple syrup - A pinch of saffron strands (soaked in 1 tablespoon of warm water for 10 minutes) - Crushed ice - Fresh mint leaves for garnish - Edible rose petals for garnish Instructions: 1. In a blender, combine the peach, Arak, lemon juice, rose water, simple syrup, saffron water, and a good amount of crushed ice. 2. Blend until smooth and frosty. 3. Pour into a chilled glass. 4. Garnish with fresh mint leaves and edible rose petals. Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks Security Unlocked Security Unlocked: CISO Series with Bret Arsenault Secure the Job: Breaking into Security Discover and follow other Microsoft podcasts at microsoft.com/podcasts Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of The CyberWire Network.