In one of the largest ever sustained global cyber espionage campaigns known as Operation Cloud Hopper, a Chinese threat actor group dubbed APT10 was able to infiltrate managed IT service providers to gain unprecedented access to their clients’ intellectual property and sensitive data. Leveraging “Red Leaves” malware, attackers were able to breach and freely move about laterally in their unsuspecting victims’ environments.
Join us and Tristan Morris, cybersecurity strategist at Carbon Black, as he walks us step-by-step through how the attack unfolded and how security professionals can implement automated defenses to detect malicious behavior like APT10’s attack before the breach occurs.
We will cover:
- Why threat hunting is so critical today
- How new intel can kick off a threat hunt
- How to quickly hunt across your enterprise
- How to scale your future threat hunts leveraging automation