Part 1: Guarding against sophisticated threats: Strategies for your best defense

BrandPost By Kristopher Russo with David Moulton
25 Oct 20232 mins
CybercrimeSecurity

Exposing Muddled Libra's meticulous tactics with Kristopher Russo & David Moulton.

Data structure and information tools for networking business and cyber security
Credit: carloscastilla

In the second episode of Threat Vector, Kristopher Russo, senior threat researcher at Unit 42, and David Moulton, discuss the threat landscape and take a deeper dive into the intricate workings of Muddled Libra (related to Scattered Spider and Scatter Swine). This formidable threat group poses significant challenges to telecommunications, technology and software automation industries.

Russo explains how Muddled Libra works, with a few distinguishing traits. Muddled Libra employs legitimate persistence tools from trusted vendors to fly under the radar to target firms with access to high-value cryptocurrency holders. The type of data Muddled Libra is after is also highly specific — and they are very persistent in finding it.

Muddled Libra has a signature move: exploit the 0ktapus phishing kit to craft believable authentication pages and manipulate victims through social engineering. What are some actionable steps businesses can take to safeguard the cyber environment? Tune in and stay updated.

Threat Vector provides insights that are both enlightening and cautionary. Still, these summaries only scratch the surface of the expert perspectives in the full podcast episodes. CISOs, C-level executives or anyone with a vested interest in safeguarding the digital world can benefit from subscribing to the Unit 42 Threat Vector podcast. Discover firsthand the invaluable knowledge, strategies and real-world stories cybersecurity experts share.

Threat Vector is your compass in the world of cybersecurity. Listen to all current segments on Unit 42 YouTube channel and Spotify.

Exit mobile version