/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Dan Perez

@mrdanperez
12 posts
2024-07-27
The work on #APT45 is the culmination of months of work by a team of analysts and stakeholders to get this across the line! Thanks to all for their hard work that were named and not named on the blog! 🍻https://cloud.google.com/ ...
2024-07-27 View on X
Associated Press

The US DOJ indicts a North Korean hacker, still at large, for his alleged role in the Andariel group's cyberattacks on US hospitals, NASA, and military bases

Associated Press :

2024-04-17
It's been a while since our last post announcing a graduation - but it's been a long time coming! I've dropped a couple hints throughout the period the team worked on this an couldn't be more proud to introduct... #APT44 https://cloud.google.com/...
2024-04-17 View on X
Wired

Mandiant links hacktivist group Cyber Army of Russia, which claimed to target utilities in France, the US, and Poland, to Russia-linked hacking group Sandworm

Cyber Army of Russia Reborn, a group with ties to the Kremlin's Sandworm unit, is crossing lines even that notorious cyberwarfare unit wouldn't dare to.

2019-11-01
Why does this matter? Two things, it shows INTENT to target rather than just bulk collection of CDRs. It also shows that #APT41 is able to collect and process hundreds of thousands of text messages for specific keywords and IMSI/Phone numbers AT SCALE! #Unprecedented. pic.twitter.com/AD03BGJNmj
2019-11-01 View on X
FireEye

FireEye: Chinese state-backed hacker group APT41 is using malware called MESSAGETAP to parse and save SMS traffic from a telecom's network at scale

#MESSAGETAP uses two config files containing IMSI/Phone numbers, and a keyword list. It uses libpcap to process ALL traffic being routed through the servers looking for the very specific IMSI/Phone numbers to then same off that data for later collection! pic.twitter.com/oHUJG0VEsM
2019-11-01 View on X
FireEye

FireEye: Chinese state-backed hacker group APT41 is using malware called MESSAGETAP to parse and save SMS traffic from a telecom's network at scale

In theory this means they can use this tool at other telecoms without issue. There wouldn't be any reason #APT41 wouldn't use this tool elsewhere if they are looking to do this same activity in other regions! pic.twitter.com/3T4S9zd5Nv
2019-11-01 View on X
FireEye

FireEye: Chinese state-backed hacker group APT41 is using malware called MESSAGETAP to parse and save SMS traffic from a telecom's network at scale

Today @FireEye is publicly unveiling #MESSAGETAP, #APT41s newest espionage dataminer that we've observed being used at a telecom providers. https://www.fireeye.com/...
2019-11-01 View on X
FireEye

FireEye: Chinese state-backed hacker group APT41 is using malware called MESSAGETAP to parse and save SMS traffic from a telecom's network at scale

Another interesting tidbit, #MESSAGETAP is not targeting a specific processing software it's processing SMS network traffic at the provider level! pic.twitter.com/HGgOYQCTow
2019-11-01 View on X
FireEye

FireEye: Chinese state-backed hacker group APT41 is using malware called MESSAGETAP to parse and save SMS traffic from a telecom's network at scale

2019-10-31
Another interesting tidbit, #MESSAGETAP is not targeting a specific processing software it's processing SMS network traffic at the provider level! pic.twitter.com/HGgOYQCTow
2019-10-31 View on X
FireEye

FireEye: Chinese state-backed hacker group APT41 is using malware called MESSAGETAP to parse and save SMS traffic from a telecom's network at scale

FireEye Mandiant recently discovered a new malware family used by APT41 (a Chinese APT group) that is designed to monitor and save SMS traffic …

#MESSAGETAP uses two config files containing IMSI/Phone numbers, and a keyword list. It uses libpcap to process ALL traffic being routed through the servers looking for the very specific IMSI/Phone numbers to then same off that data for later collection! pic.twitter.com/oHUJG0VEsM
2019-10-31 View on X
FireEye

FireEye: Chinese state-backed hacker group APT41 is using malware called MESSAGETAP to parse and save SMS traffic from a telecom's network at scale

FireEye Mandiant recently discovered a new malware family used by APT41 (a Chinese APT group) that is designed to monitor and save SMS traffic …

In theory this means they can use this tool at other telecoms without issue. There wouldn't be any reason #APT41 wouldn't use this tool elsewhere if they are looking to do this same activity in other regions! pic.twitter.com/3T4S9zd5Nv
2019-10-31 View on X
FireEye

FireEye: Chinese state-backed hacker group APT41 is using malware called MESSAGETAP to parse and save SMS traffic from a telecom's network at scale

FireEye Mandiant recently discovered a new malware family used by APT41 (a Chinese APT group) that is designed to monitor and save SMS traffic …

Today @FireEye is publicly unveiling #MESSAGETAP, #APT41s newest espionage dataminer that we've observed being used at a telecom providers. https://www.fireeye.com/...
2019-10-31 View on X
FireEye

FireEye: Chinese state-backed hacker group APT41 is using malware called MESSAGETAP to parse and save SMS traffic from a telecom's network at scale

FireEye Mandiant recently discovered a new malware family used by APT41 (a Chinese APT group) that is designed to monitor and save SMS traffic …

Why does this matter? Two things, it shows INTENT to target rather than just bulk collection of CDRs. It also shows that #APT41 is able to collect and process hundreds of thousands of text messages for specific keywords and IMSI/Phone numbers AT SCALE! #Unprecedented. pic.twitter.com/AD03BGJNmj
2019-10-31 View on X
FireEye

FireEye: Chinese state-backed hacker group APT41 is using malware called MESSAGETAP to parse and save SMS traffic from a telecom's network at scale

FireEye Mandiant recently discovered a new malware family used by APT41 (a Chinese APT group) that is designed to monitor and save SMS traffic …