Microsoft Threat Intelligence Podcast

Peach Sandstorm


Listen Later

On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Threat Intelligence Analyst Simeon Kakpovi, Intelligence Analyst Lauren Podber, and Senior Hunt Analyst Emiel Haeghebaert. In this episode, Sherrod and guests explore the evolving nature of the Iranian APT group known as "Peach Sandstorm." They discuss how they mature over time while providing valuable insights into APT actors and their evolving strategies. They discuss techniques such as password spraying and the next steps attackers take to establish persistence within the victim's environment. Sherrod also highlights Iran's unique approach to cyber operations, where they exhibit creativity and perseverance in achieving their objectives, even when they may only sometimes be the most technically sophisticated group among nation-state actors.   

  

In this episode you’ll learn:      

  • The contrast between APT actors and cybercriminals 
  • How organizations can protect themselves against password spray attacks 
  • The importance for defenders to understand the motivations and tactics of APT actors 
  •   

    Some questions we ask:     

    • What is the difference between a brute force attack and a password spray attack? 
    • How does Iran's cyber capabilities compare to those of other countries? 
    • What are some key differences between Iran and APT actors like Russia and China? 
    •  

      Resources:  

      How Microsoft Names Threat Actors  

      Peach Sandstorm 


      View Simeon Kakpovi on LinkedIn  

      View Lauren Podber on LinkedIn 

      View Emiel Haeghebaert on LinkedIn 

      View Sherrod DeGrippo on LinkedIn  


      Peach Sandstorm 

      Ingredients: 

      - 1 ripe peach, peeled and pitted 

      - 1 1/2 oz Arak (a traditional Middle Eastern aniseed-flavored spirit) 

      - 1 oz fresh lemon juice 

      - 1 oz rose water 

      - 1/2 oz simple syrup 

      - A pinch of saffron strands (soaked in 1 tablespoon of warm water for 10 minutes) 

      - Crushed ice 

      - Fresh mint leaves for garnish 

      - Edible rose petals for garnish 


      Instructions: 

      1. In a blender, combine the peach, Arak, lemon juice, rose water, simple syrup, saffron water, and a good amount of crushed ice. 

      2. Blend until smooth and frosty. 

      3. Pour into a chilled glass. 

      4. Garnish with fresh mint leaves and edible rose petals. 

       

      Related Microsoft Podcasts:                  
      • Afternoon Cyber Tea with Ann Johnson
      • The BlueHat Podcast
      • Uncovering Hidden Risks   
      • Security Unlocked    
      • Security Unlocked: CISO Series with Bret Arsenault
      • Secure the Job: Breaking into Security
      •       

        Discover and follow other Microsoft podcasts at microsoft.com/podcasts 

        Get the latest threat intelligence insights and guidance at Microsoft Security Insider


        The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of The CyberWire Network.  

        ...more
        View all episodesView all episodes
        Download on the App Store

        Microsoft Threat Intelligence PodcastBy Microsoft

        • 5
        • 5
        • 5
        • 5
        • 5

        5

        21 ratings


        More shows like Microsoft Threat Intelligence Podcast

        View all
        Risky Business by Patrick Gray

        Risky Business

        364 Listeners

        SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

        SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

        638 Listeners

        Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

        Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

        369 Listeners

        Hacked by Hacked

        Hacked

        180 Listeners

        CyberWire Daily by N2K Networks

        CyberWire Daily

        1,013 Listeners

        Smashing Security by Graham Cluley

        Smashing Security

        317 Listeners

        Click Here by Recorded Future News

        Click Here

        406 Listeners

        Darknet Diaries by Jack Rhysider

        Darknet Diaries

        7,959 Listeners

        Cybersecurity Today by Jim Love

        Cybersecurity Today

        174 Listeners

        CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

        CISO Series Podcast

        189 Listeners

        Hacking Humans by N2K Networks

        Hacking Humans

        316 Listeners

        Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

        Defense in Depth

        77 Listeners

        Cyber Security Headlines by CISO Series

        Cyber Security Headlines

        128 Listeners

        Risky Bulletin by risky.biz

        Risky Bulletin

        43 Listeners

        Hacker And The Fed by Chris Tarbell & Hector Monsegur

        Hacker And The Fed

        169 Listeners