APT stands for advanced persistent threat and refers to threat actors who are acting in the interests of other political states.
In other words, espionage.
In this episode of our #ThreatDigest series, hosts Selena Larson and Crista Giering, Senior Threat Intelligence Analysts at Proofpoint, interview Joshua Miller, Senior Threat Researcher at Proofpoint, about the advanced persistent threat landscape in Iran.
Join us as we discuss:
Determining whether malware is motivated for finances or for espionage
How Iranian threat actors have shifted their strategy since COVID
What we can infer about Iranian government priorities from threat actors
Why Iranian threat actors are taking more risks
Where to start in tracking APTs in the world of cyber threat intelligence
Check out the resources we mentioned during the podcast:
Operation SpoofedScholars: A Conversation with TA453
BadBlood: TA453 Targets US and Israeli Medical Research Personnel
I Knew You Were Trouble: TA456 Targets Defense Contractor
Media Coverage Doesn't Deter Actor From Threatening Democratic Voters
DHS blames Iran for threatening emails sent to Democratic voters
A Cyber Threat Intelligence Self-Study Plan: Part 1
STAR Webcast: Dissecting BadBlood: an Iranian APT Campaign
Better Than Binary - Elevating State-Sponsored Attribution via Spectrum of State Responsibility
For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.
Listening on a desktop & can’t see the links? Just search for Protecting People in your favorite podcast player.