Set of stealthy and continuous computer hacking processes
An advanced persistent threat (APT) is a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.[1][2] In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals.[3]
APT attacks on mobile devices have also become a legitimate concern, since attackers are able to penetrate into cloud and mobile infrastructure to eavesdrop, steal, and tamper with data.[9]
The median "dwell-time", the time an APT attack goes undetected, differs widely between regions. FireEye reported the mean dwell-time for 2018 in the Americas as 71 days, EMEA as 177 days, and APAC as 204 days.[5] Such a long dwell-time allows attackers a significant amount of time to go through the attack cycle, propagate, and achieve their objectives.
Definition
Definitions of precisely what an APT is can vary, but can be summarized by their named requirements below:
Advanced – Operators behind the threat have a full spectrum of intelligence-gathering techniques at their disposal. These may include commercial and open source computer intrusion technologies and techniques, but may also extend to include the intelligence apparatus of a state. While individual components of the attack may not be considered particularly "advanced" (e.g. malware components generated from commonly available do-it-yourself malware construction kits, or the use of easily procured exploit materials), their operators can typically access and develop more advanced tools as required. They often combine multiple targeting methods, tools, and techniques in order to reach and compromise their target and maintain access to it. Operators may also demonstrate a deliberate focus on operational security that differentiates them from "less advanced" threats.[3][10][11]
Persistent – Operators have specific objectives, rather than opportunistically seeking information for financial or other gain. This distinction implies that the attackers are guided by external entities. The targeting is conducted through continuous monitoring and interaction in order to achieve the defined objectives. It does not mean a barrage of constant attacks and malware updates. In fact, a "low-and-slow" approach is usually more successful. If the operator loses access to their target they usually will reattempt access, and most often, successfully. One of the operator's goals is to maintain long-term access to the target, in contrast to threats who only need access to execute a specific task.[10][12]
Threat – APTs are a threat because they have both capability and intent. APT attacks are executed by coordinated human actions, rather than by mindless and automated pieces of code. The operators have a specific objective and are skilled, motivated, organized and well funded. Actors are not limited to state sponsored groups.[3][10]
History and targets
Warnings against targeted, socially-engineered emails dropping trojans to exfiltrate sensitive information were published by UK and US CERT organisations in 2005. This method was used throughout the early 1990s and does not in itself constitute an APT. The term "advanced persistent threat" has been cited as originating from the United States Air Force in 2006[13] with Colonel Greg Rattray cited as the individual who coined the term.[14]
The Stuxnetcomputer worm, which targeted the computer hardware of Iran's nuclear program, is one example of an APT attack. In this case, the Iranian government might consider the Stuxnet creators to be an advanced persistent threat.[citation needed][15]
Within the computer security community, and increasingly within the media, the term is almost always used in reference to a long-term pattern of sophisticated computer network exploitation aimed at governments, companies, and political activists, and by extension, also to ascribe the A, P and T attributes to the groups behind these attacks.[16] Advanced persistent threat (APT) as a term may be shifting focus to computer-based hacking due to the rising number of occurrences. PC World reported an 81 percent increase from 2010 to 2011 of particularly advanced targeted computer attacks.[17]
Actors in many countries have used cyberspace as a means to gather intelligence on individuals and groups of individuals of interest.[18][19][20] The United States Cyber Command is tasked with coordinating the US military's offensive and defensive cyber operations.[21]
Numerous sources have alleged that some APT groups are affiliated with, or are agents of, governments of sovereign states.[22][23][24]
Businesses holding a large quantity of personally identifiable information are at high risk of being targeted by advanced persistent threats, including:[25]
A Bell Canada study provided deep research into the anatomy of APTs and uncovered widespread presence in Canadian government and critical infrastructure. Attribution was established to Chinese and Russian actors.[28]
Life cycle
Actors behind advanced persistent threats create a growing and changing risk to organizations' financial assets, intellectual property, and reputation[29] by following a continuous process or kill chain:
Target specific organizations for a singular objective
Attempt to gain a foothold in the environment (common tactics include spear phishing emails)
Use the compromised systems as access into the target network
Deploy additional tools that help fulfill the attack objective
Cover tracks to maintain access for future initiatives
In 2013, Mandiant presented results of their research on alleged Chinese attacks using APT method between 2004 and 2013[30] that followed similar lifecycle:
Initial compromise – performed by use of social engineering and spear phishing, over email, using zero-day viruses. Another popular infection method was planting malware on a website that the victim's employees will be likely to visit.[31]
Establish foothold – plant remote administration software in victim's network, create net backdoors and tunnels allowing stealth access to its infrastructure.
Escalate privileges – use exploits and password cracking to acquire administrator privileges over victim's computer and possibly expand it to Windows domain administrator accounts.
Internal reconnaissance – collect information on surrounding infrastructure, trust relationships, Windows domain structure.
Move laterally – expand control to other workstations, servers and infrastructure elements and perform data harvesting on them.
Maintain presence – ensure continued control over access channels and credentials acquired in previous steps.
Complete mission – exfiltrate stolen data from victim's network.
In incidents analysed by Mandiant, the average period over which the attackers controlled the victim's network was one year, with longest – almost five years.[30] The infiltrations were allegedly performed by Shanghai-based Unit 61398 of People's Liberation Army. Chinese officials have denied any involvement in these attacks.[32]
Previous reports from Secdev had previously discovered and implicated Chinese actors.[33]
Mitigation strategies
There are tens of millions of malware variations,[34] which makes it extremely challenging to protect organizations from APT. While APT activities are stealthy and hard to detect, the command and control network traffic associated with APT can be detected at the network layer level with sophisticated methods. Deep log analyses and log correlation from various sources is of limited usefulness in detecting APT activities. It is challenging to separate noises from legitimate traffic. Traditional security technology and methods have been ineffective in detecting or mitigating APTs.[35] Active cyber defense has yielded greater efficacy in detecting and prosecuting APTs (find, fix, finish) when applying cyber threat intelligence to hunt and adversary pursuit activities.[36][37] Human-Introduced Cyber Vulnerabilities (HICV) are a weak cyber link that are neither well understood nor mitigated, constituting a significant attack vector.[38]
Multiple organizations may assign different names to the same actor. As separate researchers could each have their own varying assessments of an APT group, companies such as CrowdStrike, Kaspersky, Mandiant, and Microsoft, among others, have their own internal naming schemes.[81] Names between different organizations may refer to overlapping but ultimately different groups, based on various data gathered.
CrowdStrike assigns animals by nation-state or other category, such as "Kitten" for Iran and "Spider" for groups focused on cybercrime.[82] Other companies have named groups based on this system — Rampant Kitten, for instance, was named by Check Point rather than CrowdStrike.[83]
Dragos bases its names for APT groups on minerals.[81]
Mandiant assigns numbered acronyms in three categories, APT, FIN, and UNC, resulting in APT names like FIN7. Other companies using a similar system include Proofpoint (TA) and IBM (ITG and Hive).[81]
Microsoft used to assign names from the periodic table, often stylized in all-caps (e.g. POTASSIUM); in April 2023, Microsoft changed its naming schema to use weather-based names (e.g. Volt Typhoon).[84]
^active since 2013, unlike most APTs, Gamaredon broadly targets all users all over the globe (in addition to also focusing on certain victims, especially Ukrainian organizations[73]) and appears to provide services for other APTs.[74] For example, the InvisiMole threat group has attacked select systems that Gamaredon had earlier compromised and fingerprinted.[73]
^Au, Man Ho (2018). "Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat". Future Generation Computer Systems. 79: 337–349. doi:10.1016/j.future.2017.06.021.
^Ingerman, Bret; Yang, Catherine (31 May 2011). "Top-Ten IT Issues, 2011". Educause Review. Archived from the original on 14 April 2021. Retrieved 14 April 2021.
^van Dantzig, Maarten; Schamper, Erik (19 December 2019). "Wocao APT20"(PDF). fox-it.com. NCC Group. Archived from the original(PDF) on 22 March 2021. Retrieved 23 December 2019.
^Tanriverdi, Hakan; Zierer, Max; Wetter, Ann-Kathrin; Biermann, Kai; Nguyen, Thi Do (8 October 2020). Nierle, Verena; Schöffel, Robert; Wreschniok, Lisa (eds.). "Lined up in the sights of Vietnamese hackers". Bayerischer Rundfunk. Archived from the original on 22 March 2021. Retrieved 11 October 2020. In Bui's case the traces lead to a group presumably acting on behalf of the Vietnamese state. Experts have many names for this group: APT 32 and Ocean Lotus are best known. In conversations with a dozen of information security specialists, they all agreed that this is a Vietnamese group spying, in particular, on its own compatriots.
Peta menunjukan lokasi Concepcion Concepcion adalah munisipalitas yang terletak di provinsi Iloilo, Filipina. Pada tahun 2010, munisipalitas ini memiliki populasi sebesar 36.881 jiwa atau 6.435 rumah tangga. Pembagian wilayah Secara administratif Concepcion terbagi menjadi 25 barangay, yaitu: Aglosong Agnaga Bacjawan Norte Bacjawan Sur Bagongon Batiti Botlog Calamigan Dungon Igbon Jamul-awon Lo-ong Macalbang Macatunao Malangabang Maliogliog Nińo Nipa Plandico Poblacion Polopińa Salvacion Ta...
Artikel ini perlu diwikifikasi agar memenuhi standar kualitas Wikipedia. Anda dapat memberikan bantuan berupa penambahan pranala dalam, atau dengan merapikan tata letak dari artikel ini. Untuk keterangan lebih lanjut, klik [tampil] di bagian kanan. Mengganti markah HTML dengan markah wiki bila dimungkinkan. Tambahkan pranala wiki. Bila dirasa perlu, buatlah pautan ke artikel wiki lainnya dengan cara menambahkan [[ dan ]] pada kata yang bersangkutan (lihat WP:LINK untuk keterangan lebih lanjut...
Topik artikel ini mungkin tidak memenuhi kriteria kelayakan umum. Harap penuhi kelayakan artikel dengan: menyertakan sumber-sumber tepercaya yang independen terhadap subjek dan sebaiknya hindari sumber-sumber trivial. Jika tidak dipenuhi, artikel ini harus digabungkan, dialihkan ke cakupan yang lebih luas, atau dihapus oleh Pengurus.Cari sumber: Aditya Pratama – berita · surat kabar · buku · cendekiawan · JSTOR (Pelajari cara dan kapan saatnya untuk me...
Multinational television channel brand For the country-specific entities, see Vice (TV channel), Viceland (Canada), and SBS Viceland. Viceland / Vice TV Viceland (stylized in all caps), and Vice TV in the United States, are brands used for television channels owned and programmed by Vice Media. Viceland launched on February 29, 2016, with two branded cable channels; the American version (rebranded from H2) is a joint venture majority-owned by A&E Networks (who owns a stake in Vice Media, ...
Pour les articles homonymes, voir Ikeda. Ikeda TomomasaBiographieNaissance 1544Décès 17 avril 1604Nom dans la langue maternelle 池田知正Activité SamouraïPère Ikeda NagamasaFratrie Ikeda Mitsushige (d)Parentèle Ikeda Sankurō (d) (fils adoptif)modifier - modifier le code - modifier Wikidata Ikeda Tomomasa (池田 知正?, 1544-1603) est un kokujin et commandant militaire de l'époque Azuchi Momoyama. Il est le deuxième fils d'Ikeda Nagamasa, lui-même important kokujin dans la...
La période de l'histoire des États-Unis de 1865 à 1918 commence avec la fin de la guerre de Sécession (1861-1865), qui opposa les États industriels du Nord aux États confédérés, notamment sur la question de l'esclavage, et se termine avec la fin de la Première Guerre mondiale. Elle est marquée en particulier par la Reconstruction, qui prend fin avec le Compromis de 1877 et le retrait des troupes du Nord des États sudistes. La période de l'Histoire des États-Unis qui s'est dérou...
Social movement to regulate the length of the working day 40-hour week redirects here. For other uses, see 40-hour week (disambiguation). For the holiday in Australia, see Labour Day. This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations. (June 2020) (Learn how and when to remove this message) Part of a series onOrganised labour Labour movement Conflict theoriesDecen...
FCS National Football Championship Datos generalesDeporte Fútbol americanoSede Estados UnidosContinente América del NorteEquipos participantes 132Datos históricosFundación 1978Otros datosSitio web oficial www.ncaa.com/sports/football/fcs[editar datos en Wikidata] FCS National Football Championship es la competición de postemporada de fútbol americano universitario que se disputa anualmente para proclamar el campeón de la subdivisión FCS (anteriormente denominada Divisi...
L'area metropolitana di Waco, come viene definita dallo United States Census Bureau, è un'area che comprende due contee del Texas centrale, nello Stato del Texas, con capoluogo la città di Waco. Al censimento del 1º aprile 2010, l'area metropolitana possedeva una popolazione di 234.906 abitanti (anche se una stima del 2016, che include la contea di Falls, già aggiunta all'area metropolitana di Waco nel 2013, vi erano 265.207 abitanti[1]). Indice 1 Contee 2 Comunità 2.1 Località ...
Metro ShanghaiKereta SHM 15A01 di Stasiun Taman GucunInfoPemilikShanghai Shentong Metro GroupWilayahShanghaiJenisAngkutan cepatJumlah jalur19Jumlah stasiun506Penumpang harian10,63 juta (rata-rata 2019)[1]13,29 juta (rekor)[2]Penumpang tahunan3,880 miliar (2019)[1]Situs webwww.shmetro.comOperasiDimulai28 Mei 1993OperatorEnam anak perusahaan Shanghai Shentong Metro Group Co. Ltd.Jumlah gerbong7.394 rangkaian[3]14 depot dan 15 tempat parkirTeknisPanjang sistem802&...
American politician Blanca RubioMember of the California State Assemblyfrom the 48th districtIncumbentAssumed office December 5, 2016Preceded byRoger Hernández Personal detailsBornBlanca Estela Rubio (1969-09-15) September 15, 1969 (age 54)Ciudad Juárez, MexicoPolitical partyDemocraticEducationEast Los Angeles College 1995-1998 Azusa Pacific University Azusa Pacific University BA Business (1998-1999) BA & Azusa Pacific University MA Education with Teaching Credential (2001-2003...
Indian social worker Janak Palta McGilliganBorn16 February 1948Jalandhar, Punjab, IndiaOccupationSocial workersKnown forEmpowerment of rural and tribal women, sustainable development, solar energy and organic farmingSpouseJames McGilliganParent(s)Maya Rani Palta and Bishambar Dass PaltaAwardsPadam Shri, Rajmata Vijyaraje Sindhyia Social ServiceManav Seva AwardSadbhavana SammanParyavaran Mitra PuraskarWebsitehttp://jimmymcgilligancentre.org/ Janak Palta McGilligan is an Indian Padma Shri ...
اضغط هنا للاطلاع على كيفية قراءة التصنيف تنين البحر المورق حالة الحفظ أنواع غير مهددة أو خطر انقراض ضعيف جدا [1] المرتبة التصنيفية نوع التصنيف العلمي فوق النطاق حيويات مملكة عليا حقيقيات النوى مملكة حيوان عويلم ثنائيات التناظر مملكة فرعية ثانوي�...
Pasang berangan Quercus elmeri Status konservasiHampir terancamIUCN78914989 TaksonomiDivisiTracheophytaSubdivisiSpermatophytesKladAngiospermaeKladmesangiospermsKladeudicotsKladcore eudicotsKladSuperrosidaeKladrosidsKladfabidsOrdoFagalesFamiliFagaceaeGenusQuercusSpesiesQuercus elmeri Merr., 1929 lbs Quercus elmeri atau pasang berangan adalah spesies pohon pasang yang berasal dari Kalimantan, Sumatera, dan Semenanjung Malaysia . [2] [3] Itu ditempatkan di Quercus subgenus Cerris...
Moribund deaf sign language of Finland Finland-Swedish Sign Languagefinlandssvenskt teckenspråk (Swedish)suomenruotsalainen viittomakieli (Finnish)Native toFinlandEthnicityFinland-SwedesNative speakers150 deaf and 300 total (2014)[1]Same figure of 150 cited in 2001[2]Language family? British Sign Swedish SignFinnish SignFinland-Swedish Sign LanguageLanguage codesISO 639-3fssGlottologfinl1235ELPFinnish-Swedish Sign Language Finland-Swedish Sign Language (FinSSL; Swed...
Bernardino Ochino (1487–1564) adalah seorang rohaniwan asal Italia. Ia dibesarkan sebagai orang Katolik dan kemudian berpindah ke Protestan dan menjadi reformator Protestan. Referensi Karl Benrath's German biography, translated into English by Helen Zimmern, with a preface by the Rev. W. Arthur, London, 1876. Atribusi Templat:1902 Britannica Pengawasan otoritas Umum Integrated Authority File (Jerman) ISNI 1 VIAF 1 WorldCat (via VIAF) Perpustakaan nasional Norwegia Spanyol Prancis (data) Th...
Railway line in China This article uses bare URLs, which are uninformative and vulnerable to link rot. Please consider converting them to full citations to ensure the article remains verifiable and maintains a consistent citation style. Several templates and tools are available to assist in formatting, such as reFill (documentation) and Citation bot (documentation). (August 2022) (Learn how and when to remove this message) This article needs additional citations for verification. Please help ...
Island within the Ryukyu Islands NakanoshimaNative name: Japanese: 中之島GeographyLocationEast China SeaCoordinates29°51′0″N 129°52′12″E / 29.85000°N 129.87000°E / 29.85000; 129.87000ArchipelagoTokara IslandsArea34.47 km2 (13.31 sq mi)Length9 km (5.6 mi)Width5 km (3.1 mi)Coastline31.8 km (19.76 mi)Highest elevation979 m (3212 ft)Highest pointOtakeAdministrationJapanKagoshima PrefectureDemog...
Mnemonic for the number of days in each month The two-handed knuckle mnemonic The knuckle mnemonic is a mnemonic device for remembering the number of days in the months of the Julian and Gregorian calendars. Methods One-handed One form of the mnemonic is done by counting on the knuckles of one's hand to remember the number of days in each month.[1] Knuckles are counted as 31 days, depressions between knuckles as 30 (or 28/29) days. One starts with the little finger knuckle as January,...