Tracing the advanced persistent threat: Interview with Joe Stewart

While McAfee's recently released "Shady RAT" report concentrated on the victims of a mass cyberespionage ring, another researcher has decided to focus his attention on the adversaries behind such attacks. In a video recorded last week at  the Black Hat conference in Las Vegas, Joe Stewart of Dell SecureWorks explains how he was able to trace 60 families of custom malware thanks to error messages yielded by a "connection bouncer" tool used by the hackers to hide their tracks, but which inadvertently pointed back to about a dozen command-and-control centers hosted by ISPs in China. Two of the malware families are known to have been used in the RSA SecurID breach. "It gives you a better line on attribution," Stewart told SCMagazineUS.com.

More in Videos

Video: The continued rise of DDoS

In this video, Ashley Stephenson, CEO at Corero Network Security, discusses the development of DDoS attacks, as well as how security professionals can grapple with the challenges the threat poses.

Video: The risks surrounding digital certificates

In this video, Jeff Hudson, CEO at Venafi, discusses the importance of digital certificates, as well as the threats surrounding forged ones should they be used in an attack against an organization.

Video: The challenges third-parties pose for SMBs

In this video, Marcos Colón, digital content coordinator at SC Magazine, sits with Charles Henderson, director of SpiderLabs at Trustwave, to discuss the growing challenges that SMBs face with third-parties that may put an organization's data at risk.