Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K. Most important thing to remember today is verify claims, stay educated, do the basics.
B (0:19)
I'm David Moulton and this is Threat Vector. Today I'm speaking with Justin Moore and andy Piazza from Unit 42. Unit 42 has published a threat brief on Iran linked cyber activity. And these two are me through what the team is actually observing, which groups are active and what defenders should be doing. Justin, Andy, welcome to Threat Vector. Really glad to have you both here today.
A (0:58)
Hey, thanks for having me, David.
C (0:59)
Yep, thanks for the break in the chaos. This is a good slowdown to have this conversation.
B (1:04)
I know it's been a busy day for you today. I appreciate you giving me a few minutes to walk through the threat brief, tell me what it's been like inside of unit 42 threat intelligence the last few days.
A (1:16)
Chaotic. Busy. A lot of typing and a lot of collaboration, a lot of communication, trying to keep a. Keep abreast of everything that's going on, you know, making sure that we're doing everything we can to protect our customers and, and that we know everything that's, that's happening that, that we can stay ahead of. So keeping us up late at night and early in the morning.
C (1:35)
Yeah, piggyback off that. I think Justin and I both being former ops folks, we thrive in chaos. So it's kind of been our sweet spot. A lot of coordination. You know, we call the internally, we call this a rapid response. And I think every time we, we do one of these within the organization, it gives us a really good opportunity to collaborate and work with some really, really smart peers across the company. Right. Product side and services side. So despite the stress and everything that's going on, it's a really, really cool opportunity to make an impact for our customers and get to know the company a little bit better internally and work with some really smart folks.
B (2:10)
Before we get into the specifics of this threat report, I want to help our audience understand how your roles connect. Justin, you're leading the rapid response right now and our fusion intelligence team. And then Andy, you're leading threat research for unit 42. How do those two functions work together when unit 42 is publishing a brief like this one?
C (2:35)
Yeah, I'll try to tackle that. Let. Let Justin expand on his role for a rapid response perspective. But day to day, I have the, the traditional threat researchers within unit 42. We're the ones that are going out into case data, customer telemetry, if they have it turned on, coming in house, and we're the ones trying to understand the intelligence picture. Big, big picture, down to the technical weeds. I won't just say strategic, but really understanding the intent capability of threat actors that we see through Palo Alto Networks, products and services. We're the ones that are going to drive a lot of the original research and then trying to make sense of that is Justin's kind of fusion intelligence role is taking what we're seeing, plus what rest of the vendors are seeing and partners and information sharing circles, trying to fuse all that together to make a bigger intelligence picture. But I'll hand it Justin to explain the chaos of running a rapid response too, and how that plays in with us.
![Unit 42's Iran Threat Brief: What We're Seeing [Threat Vector] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F31bce398-1817-11f1-847a-1fca8751cfda%2Fimage%2Fbc8bc8c30974a8c105e99695740c62e5.jpeg%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)