Put Down Your Dukes: Hunting For Hacking Group APT 29/APT 37/APT 40’s Covert Data Exfiltration
Description
What do APT 29, APT 37, and APT 40 have in common? They all have capabilities that use steganography (MITRE ATT&CK technique T1027.003) for command and control. This edition of #TechTalkTuesday will cover what steganography is, why it matters, how it works, and how to defend and hunt for it.