Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
TLP - The Digital Forensics Podcast - Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies

Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies

TLP - The Digital Forensics Podcast

07/12/24 • 21 min

plus icon
bookmark
Share icon

Send us a text

Episode Title: "Unmasking APT40: Tactics, Challenges, and Defense Strategies"
Key Takeaways:
APT40 is a sophisticated Chinese state-sponsored cyber espionage group active since 2009.
They target various sectors including academia, aerospace, defense, healthcare, and maritime industries.
APT40 uses advanced tactics such as spear phishing, watering hole attacks, and living off the land binaries (LOLBINS).
Digital forensics faces challenges in detecting APT40 due to their use of legitimate tools and anti-forensics techniques.
Effective defense against APT40 requires a comprehensive, layered security approach.
Engaging Quotes:
"APT40 represents a significant and evolving threat in the cyber landscape. Their sophisticated attacks, large scope targets and state sponsorship make them a formidable adversary." - Clint Marsden
"Defense against groups like APT40 it is not about implementing a single solution. What matters is creating a comprehensive and layered security approach that can adapt to evolving threats." - Clint Marsden
Resources Mentioned:
MITRE ATT&CK Framework: https://attack.mitre.org/
Pyramid of Pain by David J. Bianco: https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html
NIST Computer Security Incident Handling Guide: https://csrc.nist.gov/pubs/sp/800/61/r2/final
Sysmon (System Monitor): https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon
Action Points:
Implement robust email security measures, including secure email gateways and employee training.
Keep all systems and software up-to-date to reduce vulnerabilities.
Use multi-factor authentication to protect against credential theft.
Implement network segmentation to limit lateral movement.
Deploy advanced endpoint detection and response (EDR) tools.
Conduct regular threat hunting exercises.
Implement data loss prevention (DLP) solutions.
Develop a comprehensive cloud security strategy.

07/12/24 • 21 min

plus icon
bookmark
Share icon

TLP - The Digital Forensics Podcast - Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies

Transcript

(0:00 - 0:14)
Welcome to Traffic Light Protocol, the Digital Forensics Podcast. I'm your host, Clint Marsden. Today, I'm discussing another advanced persistent threat group with a specific focus on APT40.
(0:14 - 0:49)
Also known as Temp Periscope, Temp Jumper, Leviathan, or Bronze Mohawk, APT40 is a sophisticated cyber espionage group that's been causing significant disruption in the cybersecurity community for many years. And in this episode, we'll explore their tactics, techniques,

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/tlp-the-digital-forensics-podcast-499070/episode-9-unmasking-apt40-leviathan-tactics-challenges-and-defense-str-65954502"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to episode 9 -unmasking apt40 (leviathan): tactics, challenges, and defense strategies on goodpods" style="width: 225px" /> </a>

Copy