Question

In: Computer Science

What are some Motivations and techniques used for Advanced Persistent Threats (APT)? What are some events...

What are some Motivations and techniques used for Advanced Persistent Threats (APT)?

What are some events that may indicate an active attack in terms of APTs?


What are some Attack Surfaces and Vectors for Advanced Persistent Threats (APT)?

Solutions

Expert Solution

Motivations for Advanced Persistent Threats:

Usually motivations come from political and economic.

Every major business sector has recorded instances of cyberattacks by advanced actors with specific intention of trying to steal, spy, or damage.

Sectors affected include government, military, legal services, telecoms, consumer goods and many more.

Techniques used for Advanced Persistent Threats:

Some organisation takes help of espionage vectors, including social engineering, human intelligence and infiltration to gain access to a physical location to enable network attacks. These are done so that to install custom malicious software for malicious attacks.

Some events that indicate active attack:

1)HoneyMyte is an APT threat actor that we have been tracking for several years. Researchers have blogged about its variants that they had recently observed targeting Hong Kong. It has been used by multiple APT groups over the past decade, especially shared among Chinese-speaking threat actors, and has changed in many ways.

2)A computer worm, which was aimed at the Iran's nuclear program. In this case, the Iranian government might consider the Stuxnet creators to be an advanced persistent threat.

3)Group that is based in US has been tied to the North Korean government’s Reconnaissance General Bureau (RGB). Famous attack was on Sony in 2014 for producing a movie that painted their leader, Kim Jong-un.

Some Attack surfaces are:

1) Web Resources

2) Network Information

3) Human Users

Some Attack vectors are:

1) Social engineering

2) Spear phishing

3) DNS tunnelling

4) Vulnerability exploit

5) Rootkits such as trojans, worms, viruses


Related Solutions

What does it mean for a virus to be persistent or latent, and how are these events important?
What does it mean for a virus to be persistent or latent, and how are these events important?
What are some of the concentration techniques used in fecal examination? Explain each.
What are some of the concentration techniques used in fecal examination? Explain each.
What are cultural relatism? What are the some of the main motivations for it? What are the objections to this view?
What are cultural relatism? What are the some of the main motivations for it? What are the objections to this view? Do you agree with it? justify you answer with good examples.
Some of the encoding techniques used over fiber are Manchester, 4B5B, and 8B10B. What are these...
Some of the encoding techniques used over fiber are Manchester, 4B5B, and 8B10B. What are these encoding methods?
What are system access threats? and some examples.
What are system access threats? and some examples.
How could advanced-access techniques be used for the following types of facilities? a. Ambulatory surgery center...
How could advanced-access techniques be used for the following types of facilities? a. Ambulatory surgery center b. A free standing imaging center
Question 3: What are some of the motivations for leveraged and management buyouts of the firm?
Question 3: What are some of the motivations for leveraged and management buyouts of the firm?
What are some of the underlying motivations that prompt individuals to agree to requests that do...
What are some of the underlying motivations that prompt individuals to agree to requests that do not directly benefit themselves or their organizations?
Brief explanation of theory of capital budgeting and some of the techniques used.
Brief explanation of theory of capital budgeting and some of the techniques used.
iii. Outline some techniques that are used to control depression in children
iii. Outline some techniques that are used to control depression in children
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT