
Sign up to save your podcasts
Or


Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to discuss the IOCONTROL malware used by an Iranian APT actor known as the CyberAv3ngers to target civilian critical infrastructure in the U.S. and Israel. The malware acts as a Linux-based backdoor and has a modular configuration that can be adapted for IoT, OT, and SCADA devices.
Read Team82's research blog: "Inside a New OT/IoT Cyberweapon: IONCONTROL"
Listen and subscribe to the Nexus Podcast here.
By Anton Shipulin / Listen Notes4.5
88 ratings
Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to discuss the IOCONTROL malware used by an Iranian APT actor known as the CyberAv3ngers to target civilian critical infrastructure in the U.S. and Israel. The malware acts as a Linux-based backdoor and has a modular configuration that can be adapted for IoT, OT, and SCADA devices.
Read Team82's research blog: "Inside a New OT/IoT Cyberweapon: IONCONTROL"
Listen and subscribe to the Nexus Podcast here.

78,268 Listeners

2,004 Listeners

371 Listeners

374 Listeners

637 Listeners

1,022 Listeners

31 Listeners

322 Listeners

112,584 Listeners

8,018 Listeners

174 Listeners

314 Listeners

113 Listeners

137 Listeners