How Threat Analysts Learned from Attackers' OpSec Mistakes

In targeting executives at a COVID research firm, state-sponsored threat group ITG18 made some mistakes. Here's how IBM X-Force used that to their advantage.

Dark Reading Staff, Dark Reading

August 9, 2021

1 Min Read
Dark Reading logo in a gray background | Dark Reading

In their investigation of state-sponsored threat group ITG18, or "Charming Kitten," IBM X-Force researchers found attackers' operational security errors revealed intimate details about their entire operation. Here, they discuss what they learned and how their findings can aid enterprise security teams.

Read more about:

Black Hat News

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights