0:00
hoping to shed some light on the
0:01
situation a new name was coined denoting
0:04
a hacker group capable of executing such
0:06
a long-lasting attack a or advanced
0:10
persistent threat however it wasn't
0:13
until several years later that it became
0:15
clear who the original AP
0:18
was the credit for the first
0:20
Counterattack against the rat goes to a
0:22
treat research team at macafee in 2011
0:25
they broke into the server where the
0:27
stolen documents were stored it housed
0:29
the logs documenting the rat's victims
0:32
governments institutions companies and
0:35
other organizations all the victims were
0:37
breached by the same method and all of
0:39
their documents were siphoned through
0:41
the same rat caves things clicked into
0:43
place all the AP activity which seemed
0:46
like a bunch of disjointed attacks were
0:49
planned and centrally coordinated it was
0:51
a part of one operation and McAfee gave
0:54
it a name operation Shady rat in 2013
0:59
mandiant a cyber security focused
1:01
subsidiary of Google managed to get even
1:04
further they named the group behind the
1:06
operation as AP1 highlighting its size
1:09
and importance then they Trac the
1:11
breadcrumbs left by the hackers