![]() “Every time you pulled on a thread, there was a bigger piece of yarn,” Glyer recalls. The two didn’t see any of the familiar tactics of known hacking groups, but as they followed trails they realized whatever Mandiant was tracking was significant. ![]() Carr was a night owl, so they often tag-teamed, with Carr passing work back to Glyer in the morning. That evening, he spent a few hours digging into the data Carmakal sent him, then tapped Carr to take over. Employees of the two companies often shared notes on investigations, so Glyer thought nothing of the request. Now the two worked for Microsoft, where they had access to data from many more hacking campaigns than they had at Mandiant.Ĭarmakal told them the bare minimum-that he wanted help identifying some activity Mandiant was seeing. Glyer and Carr had spent years investigating large, sophisticated campaigns and had tracked the notorious hackers of the SVR-Russia’s foreign intelligence agency-extensively. ![]() Many of the hackers’ tactics were unfamiliar, and he wanted to see whether two former Mandiant colleagues, Christopher Glyer and Nick Carr, had seen them before. “While Kevin Mandia conferred with the government, Charles Carmakal, the CTO of Mandiant Consulting, contacted some old friends. Fun to see so many familiar names in today’s comprehensive WIRED piece on the SolarWinds supply chain intrusion: □
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |