Study: Nation-States Are Primary Drivers Behind APTs

  /     /     /  
Publicated : 22/11/2024   Category : security


Study: Nation-States Are Primary Drivers Behind APTs


Most enterprises still ineffective in defending themselves from sophisticated attacks, Fortinet report says



Advanced persistent threats are generally created by nation-states and are most frequently used for cyberespionage, according to a new study published Tuesday.
According to FortiGuard Labs report --
Threats on the Horizon: The Rise of the Advanced Persistent Threat
-- the APT has become a tool of the trade for government-sponsored intelligence gathering.
There are only a few groups globally that have the capability, skills, funding and infrastructure to launch an APT, the report states. China, Israel, Russia, and the United States are the most capable, but it is likely that other countries are also at least researching the tactic, if not creating APTs yet, Fortinet says.
While early analysis of APTs -- and even the definition of the term -- touched on a wide range of perpetrators and scenarios for sophisticated attacks, it is now apparent that the level of skill and resources required to create an APT severely limits the number of attackers who could potentially launch them, says Richard Henderson, security strategist at FortiGuard Labs and one of the authors of the report.
What were seeing is that these attacks are being used primarily for cyberespionage at the state level, Henderson says. Nation-states are using them mostly these days as a means of collecting intelligence.
What defines todays APT is its level of sophistication and ability to stay hidden for long periods of time, enabling the attacker to use it as an ongoing tap into the information systems of rival governments or foreign businesses, Henderson says. While early examples, such as Stuxnet, may have been tools of sabotage, todays APTs are more likely to lie quietly and collect data.
APTs dont have a typical attack pattern, the report says. Once malware is in place on a target computer, it can lay dormant for months or years at a time. This becomes especially concerning when thinking about APTs from a national infrastructure standpoint. Its very possible that a site, such as a major city power grid, is compromised right now and the malware is just waiting for someone to press a button.
While APTs are, by definition, sophisticated and multilayered, they virtually always begin with a simple compromise, such as a phishing attack or website infection, Henderson observes. Companies reported more than 142 million unsuccessful hacking attempts in the first half of 2013 alone, according to the report; users were tricked into trying to visit a potentially malicious website more than 3.14 billion times.
Yet most enterprises still dont do a very good job of protecting themselves from this type of first-level attack, Henderson says.
One of the things that surprised me most in the report is how poor companies are in teaching employees how to recognize the signs of an attack, Henderson states. It is still fairly easy for any attacker to find out who you are and send you a convincing fake message from your boss boss, telling you to go to link or access a malicious site.
And email is not the only means of infection, Henderson observes. Watering holes, drive-by downloads, PDF infections -- these are infections that can happen without any action by the user.
Preventing this sort of user-level infection is the first step in defending against APTs, Henderson says, but IT organizations need to step up their games as well. Companies still arent making patching a priority, he notes. They are worried about interrupting business continuity, but they are waiting too long to make their updates.
The recent Citadel infection at NBC.com exploited a vulnerability that had been disclosed just two weeks before, Henderson observes. In that case, a zero-day wasnt needed, he notes. The attackers got the advantage just by moving faster than the defenders on a known vulnerability.
The best defense against APTs is to know where your sensitive data is kept and how it moves in and out of the network, Henderson advises. Encryption is a good first step, but you should know where your data is being moved to, and watch the data leaving your network. A sympathetic insider can do a lot of damage.
Have a comment on this story? Please click Add a Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Study: Nation-States Are Primary Drivers Behind APTs