{"id":4289,"date":"2014-11-13T12:08:29","date_gmt":"2014-11-13T17:08:29","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4289"},"modified":"2020-08-28T11:51:46","modified_gmt":"2020-08-28T07:51:46","slug":"talk_security_wirelurker_darkhotel","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/talk_security_wirelurker_darkhotel\/4289\/","title":{"rendered":"Talk Security Podcast: Dark Hotel and WireLurker"},"content":{"rendered":"<p>Talk Security podcast hosts, Chris Brook and Brian Donohue of <a href=\"https:\/\/Threatpost.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Threatpost<\/a>, discuss the recently publicized <a href=\"https:\/\/www.kaspersky.com\/blog\/darkhotel-apt\/\" target=\"_blank\" rel=\"noopener nofollow\">Dark Hotel advanced persistent threat campaign<\/a>, which seeks to infect the machines of corporate executives as they connect to hotel networks while traveling around the world for work. Also discussed is the much talked about <a href=\"https:\/\/www.kaspersky.com\/blog\/wirelurker-ios-osx-malware\/\" target=\"_blank\" rel=\"noopener nofollow\">WireLurker Apple malware<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/wirelurker_vulnerability_revealed\/\" target=\"_blank\" rel=\"noopener nofollow\">the iOS Masque vulnerability<\/a> that enabled it.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/11\/05111733\/Talk-Security-Podcast-Dark-Hotel-and-WireLurker-1-1024x768.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6659\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/11\/05111733\/Talk-Security-Podcast-Dark-Hotel-and-WireLurker-1-1024x768.png\" alt=\"Talk-Security-Podcast-Dark-Hotel-and-WireLurker\" width=\"1067\" height=\"800\"><\/a><\/p>\n<p><em>https:\/\/html5-player.libsyn.com\/embed\/episode\/id\/3177922\/height\/270\/width\/270\/theme\/standard\/direction\/no\/autoplay\/no\/autonext\/no\/thumbnail\/yes\/preload\/no\/no_addthis\/no\/<\/em><\/p>\n<blockquote class=\"twitter-pullquote\"><p>#TalkSecurity podcast: @Threatpost\u2019s @Brokenfuses &amp; @TheBrianDonohue discuss #DarkHotel &amp; #WireLurker<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FN1z3&amp;text=%23TalkSecurity+podcast%3A+%40Threatpost%26%238217%3Bs+%40Brokenfuses+%26%23038%3B+%40TheBrianDonohue+discuss+%23DarkHotel+%26%23038%3B+%23WireLurker\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><em>*Music by <\/em><a href=\"http:\/\/freemusicarchive.org\/music\/Learning_Music\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>Learning Music<\/em><\/a><em> licensed under creative commons via <\/em><a href=\"http:\/\/freemusicarchive.org\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>the Free Music Archive<\/em><\/a><em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this episode of the Talk Security podcast, Threatpost&#8217;s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.<\/p>\n","protected":false},"author":42,"featured_media":4290,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1485],"tags":[14,477,841,1061,36,444,835],"class_list":{"0":"post-4289","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-special-projects","9":"tag-apple","10":"tag-apt","11":"tag-cyberespionage","12":"tag-ios","13":"tag-malware-2","14":"tag-podcast","15":"tag-wirelurker"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/talk_security_wirelurker_darkhotel\/4289\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/talk_security_wirelurker_darkhotel\/4360\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/talk_security_wirelurker_darkhotel\/4820\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/talk_security_wirelurker_darkhotel\/5053\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/talk_security_wirelurker_darkhotel\/6174\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/talk_security_wirelurker_darkhotel\/6658\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/talk_security_wirelurker_darkhotel\/6174\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/talk_security_wirelurker_darkhotel\/6658\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/talk_security_wirelurker_darkhotel\/6658\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/apple\/","name":"apple"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4289"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4289\/revisions"}],"predecessor-version":[{"id":17200,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4289\/revisions\/17200"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4290"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}