Web Links Directory - Free human edited web sites directory  - Article Details
  • Active Links: 293839
  • Pending Links: 1287822
  • Todays Links: 0
  • Total Articles: 2460
  • Total Categories: 14
  • Sub Categories: 867

Advanced Persistent Threats – what makes them so dangerous?

Date Added: November 29, 2011 06:23:04 AM
Author: Astal Mark
Category: Blogs: Internet
You may think that Advanced Persistent Threats (APTs) are confined to cyber espionage between nation states as it was with Ghost Net. Not anymore - APTs are threats every organisation needs to know about since they’re now com monly used to steal prized industrial and commercial data. The nature of malware attacks has also changed, with the focus shifting from many hacks on many targets to fewer hacks on bigger targets for bigger rewards. In this series, we examine the key elements of Advanced Persistent Threats – social engineering, custom Trojans and beaconing – and examine in detail: • What makes APT attacks so hard to detect and stop; • What types of organisations and data are likely targets; •Why conventional IT security defences aren’t much help; •What organisations can do to protect themselves. WHAT ARE APTs? Advanced Persistent Threat attacks are targeted, long-lasting campaigns that combine some or all of the following elements: •Social engineering and spear-phishing techniques to infiltrate organisations; •Custom-built Trojans to evade security systems; •Beacons that ‘call home for reinforcements’ to help with exfiltrating information; •Stealth - so the attack isn’t detected at the time or possibly ever; and •Residual elements such as a backdoor or a rootkit that remains undetected (persists) and secures future access. This combination gives cyber criminals greater access with lower chance of detection than other type of attack and, once inside your organisation, lets them establish a foothold for stealing information for as long as they like. WHY ARE THEY SUCCESSFUL? What makes these Advanced Persistent Threats so dangerous is that they’re very hard to detect; in fact the theft of prized information can go undetected for months or even years. A recent example is ‘Operation Shady Rat’, thought to have been sponsored by a foreign state. The attackers broke into 72 organizations across the US, Canada, Taiwan, India, South Korea and Vietnam, including the UN, and the International Olympic Committee over a 5 year period. Attackers like these also don’t give up: some of the ‘Shady Rat’ attacks persisted for up to two years. WIDER TARGETS Evidence that APT attacks have expanded from stealing industrial or government secrets is compelling and recent. With Sony, the attacks on its gaming and entertainment networks targeted another prize: its huge database of customer information. The break-ins at email services providers Silverpop and Epsilon in 2011 had a similar target: the email databases of their clients, which included Citigroup, Walgreens, Marks & Spencer and Dell Australia. Thefts like these equip the attackers with thousands or even millions of individual email addresses, which open the door for future targeted spear-phishing campaigns with big rewards.
You must be logged in to leave a rating.
Average rating: (0 votes)

No Comments Yet.

You must be logged in to leave a Comment.
How to remove link from Wldirectory
Here is the short description, how to remove your link, if you no longer need it.
Get started with jewellery online shopping and find yourself many discounts and offers to avail
Today, Internet is the most versatile tools in the field of marketing. People generally uses it, as to advertise their business and products, as to attaing more and more money and also to get some merchandise.
Shared Hosting Cons And Professionals
Tie this to the fact that Bluehost offer a one month, full money back guarantee if you are unsatisfied for just about any cause. This would be particularly so as it pertains to multiple web hosting.of datacenters.
Monster Beats Headphones Outlet
A center channel is also included. When you are experienced enough, try your hand on starting your own recording studio.
Are you purchasing quality furniture?
When it comes to purchasing furniture you have so many places to choose from.