PLAY PODCASTS
A Peek Into the Toolkit of the Dangerous 'Triton' Hackers

A Peek Into the Toolkit of the Dangerous 'Triton' Hackers

A Peek Into the Toolkit of the Dangerous 'Triton' Hackers

Security, Spoken · SpokenLayer

April 11, 20198m 6s

Audio is streamed directly from the publisher (dovetail.prxu.org) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

When the malware known both as Triton and Trisis came to light in late 2017, it quickly gained a reputation as perhaps the world's most dangerous piece of code: the first ever designed to disable the safety systems that protect industrial facilities from potentially lethal physical accidents. But Triton hackers still have to engage in a far more common forms of hacking to plant that code, in some cases spending close to a year digging their way through IT networks before they reach their targets.

Learn about your ad choices: dovetail.prx.org/ad-choices