<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Pro-Tek Blog &#187; APT Attack</title>
	<atom:link href="http://www.pro-tekconsulting.com/blog/category/apt-attack/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.pro-tekconsulting.com/blog</link>
	<description>For UI developers / UI designers and UI trends</description>
	<lastBuildDate>Thu, 05 Sep 2019 03:59:47 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.34</generator>
	<item>
		<title>IT SECURITY ADVANCED PERSISTENT THREATS</title>
		<link>http://www.pro-tekconsulting.com/blog/it-security-advanced-persistent-threats/</link>
		<comments>http://www.pro-tekconsulting.com/blog/it-security-advanced-persistent-threats/#comments</comments>
		<pubDate>Fri, 09 Mar 2018 04:20:21 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[APT Attack]]></category>
		<category><![CDATA[IT Security Advanced Persistent Threats]]></category>

		<guid isPermaLink="false">http://www.pro-tekconsulting.com/blog/?p=2455</guid>
		<description><![CDATA[<p>IT Security Advanced Persistent Threats An advanced persistent threat is a big term used to define an attack in which an invader, or team of invaders, establishes an illegal, long-term presence on a network in order to mine highly sensitive data. The targets of these attacks, which are very carefully chosen and researched, typically include [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.pro-tekconsulting.com/blog/it-security-advanced-persistent-threats/">IT SECURITY ADVANCED PERSISTENT THREATS</a> appeared first on <a rel="nofollow" href="http://www.pro-tekconsulting.com/blog">Pro-Tek Blog</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h4>IT Security Advanced Persistent Threats</h4>
<p>An advanced persistent threat is a big term used to define an attack in which an invader, or team of invaders, establishes an illegal, long-term presence on a network in order to mine highly sensitive data.</p>
<p>The targets of these attacks, which are very carefully chosen and researched, typically include large enterprises or governmental networks. The significances of such intrusions are huge:</p>
<p>Intellectual property theft such as patents, etc.<br />
Compromised sensitive information.<br />
The damaging of critical organizational infrastructures.<br />
Total site takeovers.</p>
<p>For executing an APT attack requires more resources than a normal web application attack. The culprits are usually teams of experienced cybercriminals having substantial financial backing. Some APT attacks are government-funded and used as cyber warfare weapons.</p>
<p><strong>ADVANCED PERSISTENT PROGRESSION</strong></p>
<p>A successful APT attack can be cracked down into three stages</p>
<ol>
<li>Network infiltration,</li>
<li>The expansion of the attacker’s presence and</li>
<li>The extraction of amassed data.</li>
</ol>
<p><strong>INFILTRATION </strong></p>
<p>Organizations are typically infiltrated through the compromising of one of three attack surfaces: web assets, network resources or authorized human users.</p>
<p>This is achieved either through malicious uploads or social engineering attacks—threats faced by large organizations on a regular basis.</p>
<p>Additionally, at the same time infiltrators may execute a DDoS attack against their target. This serves both as a smoke screen to distract network personnel and as a means of failing a security perimeter, making it easier to breach.</p>
<p>Once the initial access has been completed, attackers quickly install a backdoor shell—malware that grants network access and allows for remote and stealth operations.</p>
<p><strong>EXPANSION</strong></p>
<p>After the base is established, attackers move to expand their presence within the network.</p>
<p>This involves moving up an organization&#8217;s hierarchy, compromising staff members with access to the most sensitive data. In doing this, they are able to gather critical business information.</p>
<p>Depending on the final attack goal, the collected data can be sold to a contending enterprise, altered to damage a company’s product line or used to take down a complete organization.</p>
<p><strong>EXTRACTION</strong></p>
<p>While an APT event is ongoing, the lost information is usually stored in a secure location inside the network being assaulted. Once sufficient data has been collected, the thieves need to extract it without being detected.</p>
<p>Typically, white noise tactics are used to distract the security team so the information can be moved out. This might take the form of a DDoS attack, again tying up network personnel and/or weakening site defences to enable extraction.</p>
<p><strong>MEASURES </strong></p>
<p>Below are the best practice measures to take when securing your network:</p>
<ul>
<li>Patching network software and OS vulnerabilities as fast as possible.</li>
<li>Encryption of remote connections to stop invaders from piggy-backing to infiltrate your site.</li>
<li>Cleaning incoming emails to prevent spam and phishing attacks targeting your network.</li>
<li> Immediate logging of security events to improve whitelists and other security policies.</li>
</ul>
<p><img class="aligncenter size-medium wp-image-2458" src="http://www.pro-tekconsulting.com/blog/wp-content/uploads/2018/03/IT-Security-Advanced-Persistent-Threats-279x300.jpg" alt="IT Security Advanced Persistent Threats" width="279" height="300" /></p>
<p>The post <a rel="nofollow" href="http://www.pro-tekconsulting.com/blog/it-security-advanced-persistent-threats/">IT SECURITY ADVANCED PERSISTENT THREATS</a> appeared first on <a rel="nofollow" href="http://www.pro-tekconsulting.com/blog">Pro-Tek Blog</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.pro-tekconsulting.com/blog/it-security-advanced-persistent-threats/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
