Microsoft Threat Intelligence Podcast

Vanilla Tempest: The Threat Actor Behind Recent Hospital Ransomware Attacks


Listen Later

In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by security researchers Anna and Keivan to discuss two prominent threat actors: Vanilla Tempest and Peach Sandstorm. 


Vanilla Tempest, a financially motivated cybercrime group, has been involved in recent ransomware attacks on U.S. hospitals, utilizing various ransomware payloads such as Ink. They are known for using tools like PowerShell scripts and Goot Loader to exfiltrate data and extort victims. Peach Sandstorm, an Iranian nation-state threat actor, focuses on cyber espionage and intelligence collection. They have targeted various sectors, including energy, defense, and critical infrastructure, and have shown increasing sophistication in their attacks. Later, Sherrod speaks with Colton Bremer, a senior security researcher at Microsoft, about his work on the Defender Experts (DEX) team. Colton explains the different tiers of DEX services, which focus on detecting and mitigating advanced threats that may bypass traditional security measures. 


In this episode you’ll learn:      
  • A backdoor called Tickler that uses Azure infrastructure for command and control 
  • The significance of these groups' tactics and maintaining ransomware resiliency 
  • The different tiers of DEX services detecting and mitigating advanced threats 
  •  

    Some questions we ask:    
    • How does Vanilla Tempest typically execute their attacks? 
    • Has Peach Sandstorm evolved over time in their cyber espionage efforts? 
    • What can individuals or organizations do to mitigate cloud identity abuse? 
    •  

      Resources:  

      View Colton Bremer on LinkedIn  

      View Sherrod DeGrippo on LinkedIn  

       

      Related Microsoft Podcasts:                   
      • Afternoon Cyber Tea with Ann Johnson 
      • The BlueHat Podcast 
      • Uncovering Hidden Risks     

         

        Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

         

        Get the latest threat intelligence insights and guidance at Microsoft Security Insider 

         

         

        The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

        ...more
        View all episodesView all episodes
        Download on the App Store

        Microsoft Threat Intelligence PodcastBy Microsoft

        • 5
        • 5
        • 5
        • 5
        • 5

        5

        19 ratings


        More shows like Microsoft Threat Intelligence Podcast

        View all
        Security Now (Audio) by TWiT

        Security Now (Audio)

        1,972 Listeners

        Risky Business by Patrick Gray

        Risky Business

        361 Listeners

        SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

        SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

        628 Listeners

        Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

        Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

        366 Listeners

        CyberWire Daily by N2K Networks

        CyberWire Daily

        1,007 Listeners

        Smashing Security by Graham Cluley & Carole Theriault

        Smashing Security

        311 Listeners

        Click Here by Recorded Future News

        Click Here

        400 Listeners

        Malicious Life by Malicious Life

        Malicious Life

        927 Listeners

        Darknet Diaries by Jack Rhysider

        Darknet Diaries

        7,864 Listeners

        Cybersecurity Today by Jim Love

        Cybersecurity Today

        171 Listeners

        CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

        CISO Series Podcast

        187 Listeners

        Hacking Humans by N2K Networks

        Hacking Humans

        315 Listeners

        Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

        Defense in Depth

        74 Listeners

        Cyber Security Headlines by CISO Series

        Cyber Security Headlines

        129 Listeners

        Risky Bulletin by risky.biz

        Risky Bulletin

        33 Listeners