China's 5+ year campaign to penetrate perimeter network defenses
Andrew Brandt
DEF CON 33 · Day 2 · Main Stage
For more than five years, a collection of threat actors affiliated with the Chinese state systematically identified, weaponized, and exploited vulnerabilities in enterprise perimeter network devices —
AI review
Five years, multiple APT clusters, zero-day to UEFI implant evolution, and Sophos doing active counter-intelligence against attacker infrastructure — the definitive post-mortem on China's perimeter device campaign.