Tag: Cyber Espionage

Hunting PUTTER PANDA with Lancope

Security researchers are tracking cyber espionage attacks thought to be stemming from a unit of the Chinese PLA, operating under the codename PUTTER PANDA. As with other prominent attacks, organizations can leverage Lancope’s StealthWatch System to search their networks for IOCs from the PUTTER PANDA attacks to determine if they were a victim. READ MORE

Stop and Smell the “Saffron Rose”

This week, FireEye produced a report on “Operation Saffron Rose,” a cyber espionage campaign launched by an Iranian hacking group known as the Ajax Security Team. With Lancope’s StealthWatch System, organizations can perform flow queries based on IOCs from this attack to help determine if they were a victim. READ MORE

APT Number One

This week's Mandiant report goes a long way in making the case that well-funded, sophisticated attackers are currently staffed for the purpose of stealing corporate trade secrets. The report also reveals a fundamental problem in the operational preparedness of enterprises to detect these types of attacks. READ MORE

The Changing Nature of Incident Response, Part 2

We have become too reliant upon fully automated systems to detect and stop computer security breaches. People naturally desire a solution that will prevent all security incidents from occurring in the first place, but is it really reasonable to expect fully automated solutions to stop sophisticated attacks? READ MORE

Lessons Learned from the New York Times Hack

Unfortunately, The New York Times is not the only organization that has been the victim of a sophisticated, targeted attack of this nature, and it certainly will not be the last as regular drum beat of these kinds of incidents has been reported over the past few years. In order to combat these new and constantly evolving threats, defensive techniques need to adapt. READ MORE