PodParley PodParley

Click, Call, Compromise: Inside the Latest Loader Campaigns

Episode 52 of the Microsoft Threat Intelligence Podcast podcast, hosted by Microsoft, titled "Click, Call, Compromise: Inside the Latest Loader Campaigns" was published on September 10, 2025 and runs 28 minutes.

September 10, 2025 ·28m · Microsoft Threat Intelligence Podcast

0:00 / 0:00

In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Microsoft researchers Kelsey Clapp and Anna Seitz to examine two major cybercrime campaigns. The team unpacks Storm 2561’s use of SEO poisoning to distribute Trojanized software like SilentRoute and Bumblebee, stealing VPN credentials and paving the way for ransomware brokers.  They also dive into Storm 1811’s ReadBed malware, a loader deployed through bold social engineering tactics, such as fake IT help desk calls via Teams, that enable lateral movement and ransomware deployment. The discussion highlights how modern threat actors exploit trust, extend attack chains, and continually evolve their techniques, underscoring the importance of vigilance, strong security controls, and verifying before trusting. In this episode you’ll learn:      How Storm 2561 uses SEO poisoning to trick users into downloading Trojanized software The role of trust, urgency, and habit in social engineering tactics Practical steps organizations can take to block these threats and strengthen defenses Some questions we ask:     Why are initial access loaders such a big risk for organizations? How are threat actors using fake IT help desk calls to gain access? What steps should defenders take to cut off these entry points? Resources:  View Anna Seitz on LinkedIn View Kelsey Clapp on LinkedIn  View Sherrod DeGrippo on LinkedIn  Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks     Discover and follow other Microsoft podcasts at microsoft.com/podcasts  Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.

In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Microsoft researchers Kelsey Clapp and Anna Seitz to examine two major cybercrime campaigns. The team unpacks Storm 2561’s use of SEO poisoning to distribute Trojanized software like SilentRoute and Bumblebee, stealing VPN credentials and paving the way for ransomware brokers.  They also dive into Storm 1811’s ReadBed malware, a loader deployed through bold social engineering tactics, such as fake IT help desk calls via Teams, that enable lateral movement and ransomware deployment. The discussion highlights how modern threat actors exploit trust, extend attack chains, and continually evolve their techniques, underscoring the importance of vigilance, strong security controls, and verifying before trusting. In this episode you’ll learn:      How Storm 2561 uses SEO poisoning to trick users into downloading Trojanized software The role of trust, urgency, and habit in social engineering tactics Practical steps organizations can take to block these threats and strengthen defenses Some questions we ask:     Why are initial access loaders such a big risk for organizations? How are threat actors using fake IT help desk calls to gain access? What steps should defenders take to cut off these entry points? Resources:  View Anna Seitz on LinkedIn View Kelsey Clapp on LinkedIn  View Sherrod DeGrippo on LinkedIn  Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks     Discover and follow other Microsoft podcasts at microsoft.com/podcasts  Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.
Microsoft Innovation Podcast Mark Smith [nz365guy] If you want to get your ideas or questions featured on an episode, please leave us a voicemail: https://www.microsoftinnovationpodcast.com/voicemail/Dive into the future of work with the "Microsoft Innovation Podcast," exploring the intersection of People, Business, Technology, and AI.  Engage with expert guests—including thought leaders from Microsoft, industry innovators, and community specialists—who are redefining the world with advancements in AI, Cloud technologies, the Power Platform, Dynamics 365, and beyond.Every episode delivers a blend of in-depth discussions, practical insights, and actionable strategies tailored for professionals driving enablement and innovation. Join us across our six shows:The Power Platform ShowThe MVP ShowThe Copilot ShowThe Ecosystems ShowThe AI AdvantageThe AI Unfilter The Microsoft Innovative Expert Spotlight Series Podcast Jeffrey Bradbury Welcome to the Microsoft Innovative Educator (MIE) Spotlight Series Podcast. If you are an educator looking to learn how to leverage the power of innovative teaching with technology in your classroom, this is the podcast for you. Each episode of the MIE Spotlight Series features a dynamic teacher, a Microsoft Innovative Educator, showcasing how they are transforming their classrooms through creative lessons and 21st century teaching styles. This podcast is hosted by educator Jeff Bradbury from the TeacherCast Educational Network and brought to you by Microsoft in Education. Tech Directions EY Microsoft Welcome to the EY Microsoft Tech Directions podcast series – your briefing on the biggest technology trends and how they will help organizations build a better working world. We investigate the benefits of technologies and discuss how they herald a new era of improved customer, employee and stakeholder experiences, while also increasing return on investment for shareholders. In each podcast we’ll reveal how EY and Microsoft can help companies digitally transform by applying their considerable experience and innovative technologies. Mas Cara Download Microsoft Windows 11
URL copied to clipboard!