0-10 subscribers
Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !
Podcast đáng để nghe
TÀI TRỢ BỞI


1 Biscuits & Jam Returns on March 4th for Season 6 with The War & Treaty! 1:42
LIMINAL PANDA and the Implications of Global Telco Targeting
Manage episode 452213231 series 3490818
On Nov. 19, 2024, Adam testified in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. This was the first time he publicly spoke about LIMINAL PANDA, a China-nexus state-sponsored threat actor that has been targeting telecommunications organizations since at least 2020.
LIMINAL PANDA is a newly named adversary, but CrowdStrike has been tracking its activity for over three years. It uses custom tools and demonstrates extensive knowledge of telco networks, including the connections between providers. And it's not alone: There are multiple adversaries targeting telcos, with good reason — the access they grant, and the data they possess, is a gold mine for threat actors.
But LIMINAL PANDA’s activity does more than showcase why critical infrastructure is a valuable target. It also represents how Chinese cyber activity has evolved since the mid-2000s, when it mostly involved “smash and grab” operations. Now, China has refined its espionage operations to conduct subtle and advanced attacks targeting critical infrastructure entities around the world.
In this episode, Adam and Cristian dig deep into the discovery of LIMINAL PANDA, the maturation of Chinese cyber operations and the scary consequences of telco-focused cyberattacks. Adam shares more about his congressional testimony and the value of keeping government officials informed on adversary activity. Come for Adam and Cristian’s Thanksgiving recipes, and stay for a deep-dive on this evolving nation-state threat, in this episode of the Adversary Universe podcast.
Read Adam's testimony here: https://www.judiciary.senate.gov/committee-activity/hearings/big-hacks-and-big-tech-chinas-cybersecurity-threat
46 tập
Manage episode 452213231 series 3490818
On Nov. 19, 2024, Adam testified in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. This was the first time he publicly spoke about LIMINAL PANDA, a China-nexus state-sponsored threat actor that has been targeting telecommunications organizations since at least 2020.
LIMINAL PANDA is a newly named adversary, but CrowdStrike has been tracking its activity for over three years. It uses custom tools and demonstrates extensive knowledge of telco networks, including the connections between providers. And it's not alone: There are multiple adversaries targeting telcos, with good reason — the access they grant, and the data they possess, is a gold mine for threat actors.
But LIMINAL PANDA’s activity does more than showcase why critical infrastructure is a valuable target. It also represents how Chinese cyber activity has evolved since the mid-2000s, when it mostly involved “smash and grab” operations. Now, China has refined its espionage operations to conduct subtle and advanced attacks targeting critical infrastructure entities around the world.
In this episode, Adam and Cristian dig deep into the discovery of LIMINAL PANDA, the maturation of Chinese cyber operations and the scary consequences of telco-focused cyberattacks. Adam shares more about his congressional testimony and the value of keeping government officials informed on adversary activity. Come for Adam and Cristian’s Thanksgiving recipes, and stay for a deep-dive on this evolving nation-state threat, in this episode of the Adversary Universe podcast.
Read Adam's testimony here: https://www.judiciary.senate.gov/committee-activity/hearings/big-hacks-and-big-tech-chinas-cybersecurity-threat
46 tập
Tất cả các tập
×
1 China’s Cyber Enterprise Grows: CrowdStrike 2025 Global Threat Report 34:00

1 A Deep Dive into DeepSeek and the Risks of Foreign LLMs 27:26

1 Putting a Spotlight on Energy Sector Threats with Corelight's Greg Bell 34:26

1 See You I-Soon: A Peek at China’s Offensive Cyber Operations 36:13

1 The Most Prolific Adversaries and Threats of 2024 33:01

1 Cross-Domain Attacks: Know Them, Find Them, Stop Them 40:00

1 LIMINAL PANDA and the Implications of Global Telco Targeting 39:59

1 Exploring Offensive Security with CrowdStrike Red Teamers 47:39

1 The Latest in China-Taiwan Cyber Tensions 33:30

1 How CrowdStrike Tracked INDRIK SPIDER from Origin to Takedown 53:35

1 Small But Mighty: The Kernel’s Essential Role in Cybersecurity Defense 35:24

1 Coming Soon to Las Vegas: Adversary Universe Previews #FalCon2024 14:12

1 Intern Spotlight: Starting A Cyber Career with CrowdStrike 36:57

1 Hunting the Rogue Insiders Operating for FAMOUS CHOLLIMA 31:17

1 Talking OT Security with Fernando Madureira, Global CISO of Cosan 20:54
Chào mừng bạn đến với Player FM!
Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.