@ATTTechChannel
  @ATTTechChannel
AT&T Tech Channel | Breaking Down Cyclops Blink | AT&T ThreatTraq @ATTTechChannel | Uploaded April 2022 | Updated October 2024, 5 days ago.
Ganesh Kasina and George Graziano of the AT&T Chief Security Office discuss the traffic changes on associated C2 ports caused by the Cyclops Blink malware.
thehackernews.com/2022/04/fbi-shut-down-russia-linked-cyclops.html

The Episode follows ports:
636 : LDAPS
989 : FTPS Protocol (DATA)
990: FTPS Protocol (CONTROL)
992: TELNET Protocol over TLS/SSL
994: ircs [Secure IRC]
995: pop3s [POP3 over TLS/SSL]
3269: msft-gc-ssl [Microsoft Global Catalog with LDAP/SSL]
8443: Pcsync HTTPS [ Common alternate HTTPS port]

Originally recorded on April 12, 2022.

AT&T ThreatTraq welcomes your e-mail questions and feedback at attthreattraq@list.att.com
Breaking Down Cyclops Blink | AT&T ThreatTraq5/13/21 ThreatTraq Essentials| AT&T ThreatTraqNew Secret-Spilling Hole in Intel CPUs | AT&T ThreatTraqRCE Flaw in Home Routers| AT&T ThreatTraqDiavol Ransomware Deployed in TrickBot| AT&T ThreatTraqCan Your Laptop Backup Handle Ransomware?| AT&T ThreatTraqList of Vulnerabilities Abused by Ransomware Gangs | AT&T ThreatTraqAT&T Archives: Seeing the Digital Future (1961)7/29/21 ThreatTraq Essentials| AT&T ThreatTraqPharmacy and Supermarket Chain Data Leaks| AT&T ThreatTraq7/22/21 ThreatTraq Essentials| AT&T ThreatTraqA Deep Dive into Symbiote Linux Malware| AT&T ThreatTraq

Breaking Down Cyclops Blink | AT&T ThreatTraq @ATTTechChannel

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER