Matt Lin
@mahlerware
incident response @google @mandiant
ID: 1132113667724599296
25-05-2019 02:38:26
368 Tweet
235 Followers
687 Following
In 2014, John Hultquist named a Russian hacking group "Sandworm". Today, Mandiant graduates it to APT44 & reveals the online persona they created, CyberArmyofRussia, disrupted U.S. and Polish water utilities, as well as a dam in France. Full report: services.google.com/fh/files/misc/…
Uncharmed: Untangling Iran's APT42 Operations | APT42, an Iranian state-sponsored cyber espionage actor, is using enhanced social engineering schemes to gain access to victim networks, including cloud environments. cloud.google.com/blog/topics/th… Mandiant (part of Google Cloud)
I’m so proud we got here. Google Threat Intelligence is a powerful Combo of Google tech and scale, Mandiant Intelligence, Virus Total and so much more. There’s nothing else like it…enjoy. Google Cloud Mandiant (part of Google Cloud) VirusTotal cloud.google.com/blog/products/…
Ryan Naraine This is a particular offering. Note that TAG is very much an important part of Google, as is its mission to counter threats to Alphabet and its billions of users.
🚨 New: Zero-day vulnerability CVE-2025-0282 in Ivanti Connect Secure VPN is being actively exploited, including by suspected 🇨🇳 China-nexus cyber espionage groups. Our team at Mandiant (part of Google Cloud) in partnership with Ivanti just published our initial findings. 🧵 cloud.google.com/blog/topics/th…
🔥new blog detailing 0day exploitation of Ivanti appliances as well as newly observed malware families tracked as PHASEJAM and DRYHOOK. We also detail activity related to the previously observed SPAWN malware ecosystem tied to China nexus cluster UNC5337. cloud.google.com/blog/topics/th…
We have great candidates for the #UnprotectProject Linux edition Jean-Pierre LESUEUR 🧐 Great writeup on the latest Ivanti zero-day 👇 cloud.google.com/blog/topics/th…
🚨 Following a months-long investigation stemming back to mid-2024, Mandiant (part of Google Cloud) just published details on a campaign by China-nexus actor UNC3886 targeting Juniper routers. Our investigation uncovered a custom malware ecosystem on end-of-life Juniper MX devices.
Our team at Mandiant (part of Google Cloud) just published urgent research on an espionage campaign by China-nexus actors using the BRICKSTORM backdoor. They’ve been in victim networks undetected for over a year, targeting tech & legal sectors for IP theft and intel on US trade and national security.