China's 5+ year campaign to penetrate perimeter network defenses

Andrew Brandt

DEF CON 33 · Day 2 · Main Stage

For more than five years, a collection of threat actors affiliated with the Chinese state systematically identified, weaponized, and exploited vulnerabilities in enterprise perimeter network devices —

AI review

Five years, multiple APT clusters, zero-day to UEFI implant evolution, and Sophos doing active counter-intelligence against attacker infrastructure — the definitive post-mortem on China's perimeter device campaign.

Watch on YouTube