APT Or Everyday Cybercrime? How To Tell

  /     /     /  
Publicated : 22/11/2024   Category : security


APT Or Everyday Cybercrime? How To Tell


Of the many attacks corporate networks face daily, advanced persistent threats are the most serious. Consider these tips to tell which kind of attack youre facing and what to do about it.



Oil companies, Internet technology firms, defense contractors, and even computer-security firms have all been targeted by persistent adversaries bent on stealing intellectual property and sensitive business information.
Advanced persistent threats (APTs)--a term thats become much maligned since the media locked onto it--describes attackers that are targeting specific companies and data, rather than searching for vulnerable targets of opportunity. Persistent attackers stole oil field exploration data from ExxonMobil, information on the Joint Strike Fighter from Lockheed Martin and Northrup Grumman, and sensitive data on SecurID tokens from RSA. For many in the industry, the question is no longer if they have been breached, but how deeply, said Richard Bejtlich, chief security officer of Mandiant.
No one has been able to stop these guys, no one, he said. They remain a problem for every company with valuable intellectual property.
Separating persistent threats from more opportunistic cybercrime-focused attacks is not easy, but can help inform defense, according to security experts. Block an opportunistic attack and the crisis is averted; block a persistent attacker and they will come back tomorrow, said Toralv Dirro, security strategist for McAfees Labs in the Europe, Middle East, and Africa region.
If someone is a victim of a targeted attack, there are patterns, Dirro said. They should really follow up on identifying those patterns.
In many cases, the patterns are not clear. Even advanced attackers will only use, for example, the minimum force necessary to compromise a network. In some cases, attackers have rented botnets; in others, theyve used standard cybercrime tools.
It is never a case of, oh, they are using Poison Ivy, so its APT--everyone is using Poison Ivy, Mandiants Bejtlich said. It really comes down to a lot of analysis to figure out what is going on.
Read the rest of this article on
Dark Reading
.
Read our report on how to guard your systems from a SQL attack.
Download the report now
. (Free registration required.)

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
APT Or Everyday Cybercrime? How To Tell