Peach Sandstorm

Published: Oct. 11, 2023, 7:05 a.m.

b'On this week\'s episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Threat Intelligence Analyst Simeon Kakpovi, Intelligence Analyst Lauren Podber, and Senior Hunt Analyst Emiel Haeghebaert. In this episode, Sherrod and guests explore the evolving nature of the Iranian APT group known as "Peach Sandstorm." They discuss how they mature over time while providing valuable insights into APT actors and their evolving strategies. They discuss techniques such as password spraying and the next steps attackers take to establish persistence within the victim\'s environment. Sherrod also highlights Iran\'s unique approach to cyber operations, where they exhibit creativity and perseverance in achieving their objectives, even when they may only sometimes be the most technically sophisticated group among nation-state actors.\\xa0\\xa0\\xa0\\n\\xa0\\xa0\\nIn this episode you\\u2019ll learn:\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\n\\nThe contrast between APT actors and cybercriminals\\xa0\\n\\nHow organizations can protect themselves against password spray attacks\\xa0\\n\\nThe importance for defenders to understand the motivations and tactics of APT actors\\xa0\\n\\n\\xa0\\xa0\\nSome questions we ask:\\xa0\\xa0\\xa0\\xa0\\xa0\\n\\nWhat is the difference between a brute force attack and a password spray attack?\\xa0\\n\\nHow does Iran\'s cyber capabilities compare to those of other countries?\\xa0\\n\\nWhat are some key differences between Iran and APT actors like Russia and China?\\xa0\\n\\n\\xa0\\nResources:\\xa0\\xa0\\nHow Microsoft Names Threat Actors\\xa0\\xa0\\nPeach Sandstorm\\xa0\\n\\nView Simeon Kakpovi on LinkedIn\\xa0\\xa0\\nView Lauren Podber on LinkedIn\\xa0\\nView Emiel Haeghebaert on LinkedIn\\xa0\\nView Sherrod DeGrippo on LinkedIn\\xa0\\xa0\\n\\nPeach Sandstorm\\xa0\\nIngredients:\\xa0\\n- 1 ripe peach, peeled and pitted\\xa0\\n- 1 1/2 oz Arak (a traditional Middle Eastern aniseed-flavored spirit)\\xa0\\n- 1 oz fresh lemon juice\\xa0\\n- 1 oz rose water\\xa0\\n- 1/2 oz simple syrup\\xa0\\n- A pinch of saffron strands (soaked in 1 tablespoon of warm water for 10 minutes)\\xa0\\n- Crushed ice\\xa0\\n- Fresh mint leaves for garnish\\xa0\\n- Edible rose petals for garnish\\xa0\\n\\nInstructions:\\xa0\\n1. In a blender, combine the peach, Arak, lemon juice, rose water, simple syrup, saffron water, and a good amount of crushed ice.\\xa0\\n2. Blend until smooth and frosty.\\xa0\\n3. Pour into a chilled glass.\\xa0\\n4. Garnish with fresh mint leaves and edible rose petals.\\xa0\\n\\xa0\\n\\nRelated Microsoft Podcasts:\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\n\\nAfternoon Cyber Tea with Ann Johnson\\n\\nThe BlueHat Podcast\\n\\n\\nUncovering Hidden Risks\\xa0\\xa0\\xa0\\n\\n\\nSecurity Unlocked\\xa0\\xa0\\xa0\\xa0\\n\\nSecurity Unlocked: CISO Series with Bret Arsenault\\n\\nSecure the Job: Breaking into Security\\n\\n\\xa0\\xa0\\xa0\\xa0\\xa0\\xa0\\nDiscover and follow other Microsoft podcasts at microsoft.com/podcasts\\xa0\\nGet the latest threat intelligence insights and guidance at Microsoft Security Insider\\n\\nThe Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of The CyberWire Network.'