Exposing Muddled Libra's meticulous tactics with Kristopher Russo & David Moulton. Credit: carloscastilla In the second episode of Threat Vector, Kristopher Russo, senior threat researcher at Unit 42, and David Moulton, discuss the threat landscape and take a deeper dive into the intricate workings of Muddled Libra (related to Scattered Spider and Scatter Swine). This formidable threat group poses significant challenges to telecommunications, technology and software automation industries. Russo explains how Muddled Libra works, with a few distinguishing traits. Muddled Libra employs legitimate persistence tools from trusted vendors to fly under the radar to target firms with access to high-value cryptocurrency holders. The type of data Muddled Libra is after is also highly specific -- and they are very persistent in finding it. Muddled Libra has a signature move: exploit the 0ktapus phishing kit to craft believable authentication pages and manipulate victims through social engineering. What are some actionable steps businesses can take to safeguard the cyber environment? Tune in and stay updated. Threat Vector provides insights that are both enlightening and cautionary. Still, these summaries only scratch the surface of the expert perspectives in the full podcast episodes. CISOs, C-level executives or anyone with a vested interest in safeguarding the digital world can benefit from subscribing to the Unit 42 Threat Vector podcast. Discover firsthand the invaluable knowledge, strategies and real-world stories cybersecurity experts share. Threat Vector is your compass in the world of cybersecurity. Listen to all current segments on Unit 42 YouTube channel and Spotify. Related content brandpost Sponsored by Palo Alto Networks Code-to-cloud: Achieving complete cloud security Securing applications can only be achieved with a platform approach where developers and security teams share the same single source of truth. By Ankur Shah, SVP and GM of Prisma Cloud at Palo Alto Networks Nov 14, 2023 5 mins Security brandpost Sponsored by Palo Alto Networks Now is the time to insist on total visibility, enabling your organization to utilize AI strategically and comprehensively in the future AI allows organizations to embrace digital transformation and customize platformization to visualize total infrastructure and manage security threats in real-time—meeting the potential challenges of 2024. By Anand Oswal, SVP of Product, Network Security at Palo Alto Networks Nov 09, 2023 4 mins Digital Transformation brandpost Sponsored by Palo Alto Networks Defending Against Advanced Threats, Part 2 Advanced threats are often highly persistent and can rapidly pivot when encountering roadblocks. Keen insights uncover threat actors’ ability to perform deep reconnaissance to understand their targeted environments thoroughly. Learn more today. By Stephanie Regan with David Moulton Oct 25, 2023 2 mins Cybercrime brandpost Sponsored by Palo Alto Networks AI’s Impact on Cybersecurity It’s on everyone’s mind: How will AI benefit threat actors? By Michael “Siko” Sikorski with David Moulton Oct 25, 2023 3 mins Cyberattacks Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe