Mandiant is investigating hacks in efforts to better their research
Mandiant, the company behind the big research report we talked about on APT1, is now asking for people to talk about their hacking episodes they’ve been affected with. They’re trying to be the go-to investigators, it seems, for the Fortune 1000.
When trying for importance, first of all, let your work speak for yourself instead of trying so hard and stating your intents. Anyway, back on topic…When the New York Times was hacked back in late 2012, phone calls were made to Mandiant. When Mandiant investigated this issue, reports were shown that the hacks were coming from a hidden firm in the Chinese military, called APT1.
A 60-page report (PDF), which was created by Mandiant, detailed the issues behind cyber-espionage group APT1. The New York Times detailed all about APT1 as well (which summarized some info in the 60-pg. report), and by rights done so out of anger/reply against the crime group.
One of the surprising aspects of the report, is that APT1 practiced spearphishing attacks on the NYT, but what were they targeting? A big organization with big media possibilities. That’s the point in spearphishing.
Mandiant’s data forensic capabilities are stepping it up, and now they want to know about your hacks that have been experienced. They’re looking to investigate more of the issues behind some of the hacks. They want to target the organizations, whomever they are, that are behind these small-to-large scale attacks.
Check out this video from Mandiant:
Some of Mandiant’s operations can be read on their annual report.
This proves that the investigations are continuing in trial for the cyberwars that are going on around the world. It’s still continuing, and even stepped up in some means.
Feel free to comment on this story below.
About Jay PfoutzMarketer
- https://t.co/3s2flApIaj 20 hours ago
- https://t.co/2iSEiGZMIL 1 day ago
- I just entered to win a VITAMIX + lots more! #Organic #Organics #Wellness wn.nr/SSZCd5 6 days ago
- https://t.co/hy1YhH1zJe 2 weeks ago
- https://t.co/MEgSqlCjl9 2 weeks ago