Global Information Lookup Global Information

Advanced persistent threat information


An advanced persistent threat (APT) is a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.[1][2] In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals.[3]

Such threat actors' motivations are typically political or economic.[4] Every major business sector has recorded instances of cyberattacks by advanced actors with specific goals, whether to steal, spy, or disrupt. These targeted sectors include government, defense, financial services, legal services, industrial, telecoms, consumer goods and many more.[5][6][7] Some groups utilize traditional espionage vectors, including social engineering, human intelligence and infiltration to gain access to a physical location to enable network attacks. The purpose of these attacks is to install custom malware (malicious software).[8]

APT attacks on mobile devices have also become a legitimate concern, since attackers are able to penetrate into cloud and mobile infrastructure to eavesdrop, steal, and tamper with data.[9]

The median "dwell-time", the time an APT attack goes undetected, differs widely between regions. FireEye reported the mean dwell-time for 2018 in the Americas as 71 days, EMEA as 177 days, and APAC as 204 days.[5] Such a long dwell-time allows attackers a significant amount of time to go through the attack cycle, propagate, and achieve their objectives.

  1. ^ "What Is an Advanced Persistent Threat (APT)?". www.kaspersky.com. Archived from the original on 22 March 2021. Retrieved 11 August 2019.
  2. ^ "What Is an Advanced Persistent Threat (APT)?". Cisco. Archived from the original on 22 March 2021. Retrieved 11 August 2019.
  3. ^ Maloney, Sarah. "What is an Advanced Persistent Threat (APT)?". Archived from the original on 7 April 2019. Retrieved 9 November 2018.
  4. ^ Cole., Eric (2013). Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization. Syngress. OCLC 939843912.
  5. ^ a b "M-Trends Cyber Security Trends". FireEye. Archived from the original on 21 September 2021. Retrieved 11 August 2019.
  6. ^ "Cyber Threats to the Financial Services and Insurance Industries" (PDF). FireEye. Archived from the original (PDF) on 11 August 2019.
  7. ^ "Cyber Threats to the Retail and Consumer Goods Industry" (PDF). FireEye. Archived from the original (PDF) on 11 August 2019.
  8. ^ "Advanced Persistent Threats: A Symantec Perspective" (PDF). Symantec. Archived from the original (PDF) on 8 May 2018.
  9. ^ Au, Man Ho (2018). "Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat". Future Generation Computer Systems. 79: 337–349. doi:10.1016/j.future.2017.06.021.

and 27 Related for: Advanced persistent threat information

Request time (Page generated in 1.0032 seconds.)

Advanced persistent threat

Last Update:

An advanced persistent threat (APT) is a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer...

Word Count : 4126

Cyberwarfare by China

Last Update:

organs of the People's Republic of China, including affiliated advanced persistent threat (APT) groups, against other countries. While some details remain...

Word Count : 4414

Hubei State Security Department

Last Update:

the province. The department is best known for operating the advanced persistent threat 31 (APT 31). The Hubei State Security Department was established...

Word Count : 1176

Gamaredon

Last Update:

UNC530, ACTINIUM, or Aqua Blizzard (by Microsoft) is a Russian advanced persistent threat that has been active since at least 2013. Cyber espionage appears...

Word Count : 208

Charming Kitten

Last Update:

as an advanced persistent threat. On December 15, 2017, the group was designated by FireEye as a nation state-based advanced persistent threat, regardless...

Word Count : 1154

Threat actor

Last Update:

competitors. These threat actors all have distinct motivations, techniques, targets, and uses of stolen data. See Advanced persistent threats for a list of...

Word Count : 2059

China Information Technology Security Evaluation Center

Last Update:

cyberespionage for the agency, and provides aid to the many advanced persistent threats (APTs) run directly by the agency, by its semi-autonomous provincial...

Word Count : 560

OceanLotus

Last Update:

7 November 2020. "Vietnamese APT32 group is one of the most advanced APTs in the threat landscape". Cyberdefensemagazine.com. Retrieved 7 November 2020...

Word Count : 509

Lazarus Group

Last Update:

group, the group has now been designated as an advanced persistent threat due to intended nature, threat, and wide array of methods used when conducting...

Word Count : 4718

Equation Group

Last Update:

The Equation Group, classified as an advanced persistent threat, is a highly sophisticated threat actor suspected of being tied to the Tailored Access...

Word Count : 1393

Kimsuky

Last Update:

Emerald Sleet) is a North Korean state-backed hacker group and advanced persistent threat that targets South Korean think tanks, industry, nuclear power...

Word Count : 287

Fancy Bear

Last Update:

result of the explosion. Fancy Bear is classified by FireEye as an advanced persistent threat. Among other things, it uses zero-day exploits, spear phishing...

Word Count : 8093

Red Apollo

Last Update:

of the Ministry of State Security. The team was designated an advanced persistent threat by Fireeye, who reported that they target aerospace, engineering...

Word Count : 788

Tailored Access Operations

Last Update:

held responsible for how the NSA uses this advance information. Advanced persistent threat Cyberwarfare in the United States Equation Group Magic Lantern...

Word Count : 2464

PLA Unit 61398

Last Update:

Military Unit Cover Designator (MUCD) of a People's Liberation Army advanced persistent threat unit that has been alleged to be a source of Chinese computer...

Word Count : 1175

APT40

Last Update:

Proofpoint), MUDCARP, Periscope, Temp.Periscope, and Temp.Jumper, is an advanced persistent threat operated by the Hainan State Security Department, a branch of...

Word Count : 380

Cozy Bear

Last Update:

Cozy Bear, classified by the United States federal government as advanced persistent threat APT29, is a Russian hacker group believed to be associated with...

Word Count : 2648

Helix Kitten

Last Update:

least 2014. It has targeted many of the same organizations as Advanced Persistent Threat 33, according to John Hultquist. In April 2019, APT34's cyber-espionage...

Word Count : 244

Elfin Team

Last Update:

Advanced Persistent Threat 33 (APT33) is a hacker group identified by FireEye as being supported by the government of Iran. The group has also been called...

Word Count : 470

Unit 8200

Last Update:

Unit 8200 (Hebrew: יחידה 8200, Yehida shmone matayim "Unit eight two-hundred") is an Israeli Intelligence Corps unit of the Israel Defense Forces responsible...

Word Count : 2956

Titan Rain

Last Update:

activity is believed to be associated with a state-sponsored advanced persistent threat. It was given the designation Titan Rain by the federal government...

Word Count : 444

Chinese intelligence activity abroad

Last Update:

security cameras. Since at least April 2017, TEMP.Periscope, an advanced persistent threat based in China, has been hacking Cambodian organizations related...

Word Count : 21475

China Chopper

Last Update:

shell is commonly used by malicious Chinese actors, including advanced persistent threat (APT) groups, to remotely control web servers. This web shell...

Word Count : 434

FIN7

Last Update:

Carbon Spider, ELBRUS, or Sangria Tempest, is a Russian criminal advanced persistent threat group that has primarily targeted the U.S. retail, restaurant...

Word Count : 961

Operation Aurora

Last Update:

Operation Aurora was a series of cyber attacks performed by advanced persistent threats such as the Elderwood Group based in Beijing, China, with associations...

Word Count : 3070

Cisco Talos

Last Update:

(BSI) Advanced Persistent Threat (APT) response service providers list in May 2022.   Talos regularly collects data on the latest cybersecurity threats, malware...

Word Count : 1303

Ivanti

Last Update:

Management and Security Suite" was "Highly Commended" in the Best Advanced Persistent Threat Protection category at the SC Magazine Awards Europe 2014. In...

Word Count : 1545

PDF Search Engine © AllGlobal.net