SUPERNOVA activity and its possible connection to SPIRAL threat group. [Research Saturday] - podcast episode cover

SUPERNOVA activity and its possible connection to SPIRAL threat group. [Research Saturday]

May 08, 202120 minSeason 3Ep. 182
--:--
--:--
Listen in podcast apps:
Metacast
Spotify
Youtube
RSS

Episode description

Guest Mike McLellan from Secureworks joins us to share his team's insights about SUPERNOVA and threat group attribution. Similarities between the SUPERNOVA activity and a previous compromise of the network suggest that SPIRAL was responsible for both intrusions and reveal information about the threat group. In late 2020, Secureworks® Counter Threat Unit™ (CTU) researchers observed a threat actor exploiting an internet-facing SolarWinds server to deploy the SUPERNOVA web shell. Additional analysis revealed similarities to intrusion activity identified on the same network earlier in 2020, suggesting the two intrusions are linked. CTU™ researchers attribute the intrusions to the SPIRAL threat group. Characteristics of the activity suggest the group is based in China. The research can be found here: SUPERNOVA Web Shell Deployment Linked to SPIRAL Threat Group Learn more about your ad choices. Visit megaphone.fm/adchoices
For the best experience, listen in Metacast app for iOS or Android
Open in Metacast
SUPERNOVA activity and its possible connection to SPIRAL threat group. [Research Saturday] | CyberWire Daily podcast - Listen or read transcript on Metacast