Microsoft Threat Intelligence Podcast

Click, Call, Compromise: Inside the Latest Loader Campaigns


Listen Later

In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Microsoft researchers Kelsey Clapp and Anna Seitz to examine two major cybercrime campaigns. The team unpacks Storm 2561’s use of SEO poisoning to distribute Trojanized software like SilentRoute and Bumblebee, stealing VPN credentials and paving the way for ransomware brokers. 

They also dive into Storm 1811’s ReadBed malware, a loader deployed through bold social engineering tactics, such as fake IT help desk calls via Teams, that enable lateral movement and ransomware deployment. The discussion highlights how modern threat actors exploit trust, extend attack chains, and continually evolve their techniques, underscoring the importance of vigilance, strong security controls, and verifying before trusting.


In this episode you’ll learn:     

  • How Storm 2561 uses SEO poisoning to trick users into downloading Trojanized software

    • The role of trust, urgency, and habit in social engineering tactics

    • Practical steps organizations can take to block these threats and strengthen defenses

      Some questions we ask:    

      • Why are initial access loaders such a big risk for organizations?

      • How are threat actors using fake IT help desk calls to gain access?

      • What steps should defenders take to cut off these entry points?


        Resources: 

        View Anna Seitz on LinkedIn

        View Kelsey Clapp on LinkedIn 

        View Sherrod DeGrippo on LinkedIn 


        Related Microsoft Podcasts:

        • Afternoon Cyber Tea with Ann Johnson

        • The BlueHat Podcast

        • Uncovering Hidden Risks    


          Discover and follow other Microsoft podcasts at microsoft.com/podcasts 


          Get the latest threat intelligence insights and guidance at Microsoft Security Insider


          The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.

          ...more
          View all episodesView all episodes
          Download on the App Store

          Microsoft Threat Intelligence PodcastBy Microsoft

          • 5
          • 5
          • 5
          • 5
          • 5

          5

          22 ratings


          More shows like Microsoft Threat Intelligence Podcast

          View all
          Hacked by Hacked

          Hacked

          188 Listeners

          Security Now (Audio) by TWiT

          Security Now (Audio)

          2,010 Listeners

          The Talk Show With John Gruber by Daring Fireball / John Gruber

          The Talk Show With John Gruber

          3,145 Listeners

          Risky Business by Patrick Gray

          Risky Business

          372 Listeners

          SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

          SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

          652 Listeners

          CyberWire Daily by N2K Networks

          CyberWire Daily

          1,024 Listeners

          Smashing Security by Graham Cluley

          Smashing Security

          319 Listeners

          Click Here by Recorded Future News

          Click Here

          418 Listeners

          Darknet Diaries by Jack Rhysider

          Darknet Diaries

          8,054 Listeners

          Cybersecurity Today by Jim Love

          Cybersecurity Today

          181 Listeners

          Hacking Humans by N2K Networks

          Hacking Humans

          314 Listeners

          CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

          CISO Series Podcast

          189 Listeners

          Cyber Security Headlines by CISO Series

          Cyber Security Headlines

          140 Listeners

          Cyber Hack by BBC World Service

          Cyber Hack

          1,633 Listeners

          Risky Bulletin by risky.biz

          Risky Bulletin

          44 Listeners