Put Down Your Dukes: Hunting For Hacking Group APT 29/APT 37/APT 40’s Covert Data Exfiltration

Description

What do APT 29, APT 37, and APT 40 have in common? They all have capabilities that use steganography (MITRE ATT&CK technique T1027.003) for command and control. This edition of #TechTalkTuesday will cover what steganography is, why it matters, how it works, and how to defend and hunt for it.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top