Advanced Persistent Threats: Not-So-Advanced Methods After All

  /     /     /  
Publicated : 22/11/2024   Category : security


Advanced Persistent Threats: Not-So-Advanced Methods After All


Cybercriminals are taking a more systematic approach with their attack techniques, new IBM report finds



Cybercriminals behind heavily funded hacking operations are not necessarily using highly sophisticated malware to gain access to sensitive data or to spy on employees, according to a study released this week by IBM (NYSE:IBM).
Attackers behind many of the so-called advanced persistent threats are known for targeting specific organizations, infiltrating them and remaining stealthy for lengthy periods of time. But cybercriminals, even those backed by powerful nation-states, often use fairly common hacking techniques and less sophisticated methods to gain initial access to systems and steal data.
More often than not, these efforts follow a path of least resistance and rely on simpler, tried-and-true methods rather than zero-day attacks and sophisticated malware, wrote Leslie Horacek, who authored the
IBM X-Force Trend and Risk Report
. Advanced persistent threats, while persistent, did not always use advanced technical approaches such as zero-day exploits and self-modifying malware.
Read the full story here on CRN
Post a comment to the original version of this story on
CRN

Last News

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Advanced Persistent Threats: Not-So-Advanced Methods After All