Advanced Persistent Threat Analysis

1083 Words3 Pages

Advanced Persistent Threat (APTs) is one of the most difficult challenges faced by the anti-virus community. APTs have made headlines in the last few years for breaching some of the most well-known enterprise networks (Gamer, 2009). The term Advanced Persistent Threat was first coined by United States Air force in 2006 to describe the complex cyber-attacks against specific target over a long period of time (Bejtlich, 2010). It was employed by nation states to penetrate other nation’s network for security secrets and other defense data, it is unlike the previous cyber-attacks that went after credit card and other personal identify information.
APTs employ far more sophisticated tactics than other types of attacks. They combine advanced technology with traditional intelligence gathering to gain entry to a network. They then stay hidden for long periods scoping out where targeted data resides and where vulnerabilities exist, and then develop customized attacks to breach these vulnerabilities and seize sensitive data. These blended and stealthy methods circumvent traditional network security that protects against known cyber threat signatures (ISACA, 2013).

The methods developed for an APT don’t always end with one attack. These techniques are often copied and applied by other perpetrators against other targets, including organizations of all sizes. Eventually, these techniques may be commoditized and turned into malware kits that are readily available to common hackers for a nominal cost (Rivner, 2011).
In this respect, the life cycle of an APT may extend for many years beyond its original target and victimize hundreds or thousands of other targets. The figure below shows the exploit code from Aurora APT announced in 2010, which h...

... middle of paper ...

...sue 6, June-2011.
[12] Computer Security Resource Center (CSRC). Descriptions of SHA-256, SHA-384, and SHA-512. Accessed 27th January, 2013. Available http://csrc.nist.gov/groups/STM/cavp/documents/shs/sha256-384-512.pdf on 27th Janauary, 2014.
[13] Evgeny M. (2009). The RSA Algorithm Accessed 13th October, 2013. Available https://www.math.washington.edu/~morrow/336_09/papers/Yevgeny.pdf
[14] IP Lookup . Accessed 13th October, 2013. Available http://www.ip-tracker.org/
[15] Onifade, O.F.W. and Adebayo, K. J.( 2011).Phishing and Identity Thefts on the Internet.Journal of Information Technology Impact Vol. 11, No. 2, pp. 133-144, 2011
[16] Yusuf, S.E., Adebayo, K. J. and Adetula E. O. (2013). Mitigating Cyber Identity Fraud using Advanced Multv Anti-Phishing Technique. International Journal of Advaned Computer Science and its Applications (IJACSA) Vol. 4, No. 3.

More about Advanced Persistent Threat Analysis

Open Document