Transcript
Podcast Host / Announcer (0:02)
You're listening to the Cyberwire Network, powered by N2K. As we take a short break for the holidays, we want to thank you for being part of our community and for tuning in throughout the year. Today we're bringing you a Special Encore Episode 1. We'll hope you enjoy revisiting or hearing for the first time however you're spending the season. We wish you happy Holidays, a safe and restful break, and as always, thank you for listening.
Dave Bittner (0:41)
Most environments trust far more than they should, and attackers know it. ThreatLocker solves that by enforcing default deny at the point of execution. With Threat locker allow listing, you stop unknown executables cold. With ring fencing, you control how trusted applications behave. And with threatlocker DAC defense against configurations, you get real assurance that your environment is free of misconfigurations and clear visibility into whether you meet compliance standards. ThreatLocker is the simplest way to enforce zero trust principles without the operational pain. It's powerful protection that gives CISOs real visibility, real control, and real peace of mind. ThreatLocker makes zero trust attainable even for small security teams. See why thousands of organizations choose ThreatLocker to minimize alert fatigue, stop ransomware at the source, and regain control over their environments. Schedule your demo@threatlocker.com N2K today. Hello everyone, and welcome to the Cyberwires Research Research Saturday I'm Dave Buettner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems, and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
Tom Hagel (2:18)
Ghostwriter is an actor that we've been pretty closely tracking for some time. You know, they've been around for it's been close to a decade at this point. They really kind of popped up in around 2016, but when the war in Ukraine kicked off more recently, that really kind of drew our attention to Ghost Rider and the activity that they were doing within the region.
Dave Bittner (2:41)
That's Tom Hagel, principal threat researcher from Sentinel Lab's research team. The research is titled Ghost New Campaign targets Ukrainian Government and Belarusian Opposition.
Tom Hagel (2:59)
A lot of what that group has done over the years has stretched outward into regions that we tend to have defensive postures in, in like Western countries and so forth. So that is ultimately what attracts us to tracking this actor and trying to stay on top of what they're doing, defend against them from a technical perspective, but also from like an intelligence perspective as well. So with that posture in mind, we ultimately have a lot of monitoring in place for anything that this actor is doing new in regions that we typically don't see them in anything that could pop up as an interesting shift in techniques or targets and so forth. So got a lot of things in place to watch them and ultimately this research was centered around a lot of interesting shifts in the technicalities of how they're doing their attacks with the malicious documents, but also more the domestic targeting which we don't see too often. Domestic targeting in particular is what we see kind of focused on the Belarusian political opposition for the upcoming presidential election in that area and so forth. So a lot of interesting things kind of going on with this actor is really what took our attention to kind of focus on them and kind of find this research out before we dig.
![Excel-lerating cyberattacks. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F41e40b60-da1a-11f0-9a8a-2badb896a8d6%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)