Cyber Attack nowdays very popular with malware, trojan, worm, etc. Cyber Attack can be carried out by individuals or groups. Cyber attacks, problems of Internet security and of protecting internal networks of various organisations are discussed widely, not only in everyday life, but also in various business sectors and government sectors. And Advanced Persistent Threat (APT) Cyber Attack still the big problem because it too complex tools and cyber weapons that they used, also with very good social engineering make APT not easy to detect.
What /who is Advanced Persistent Threat (APT)?
Advanced persistent threats (APTs) are attacks that gain an unauthorized foothold for the purpose of executing an extended, continuous attack over a long period of time using a variety of tools to achieve a single and specific malicious objective. (Carbonblack)
APTs attack different with common cyber attack from several perspective.
Traditional Attacks | APT Attacks | |
Attacker | Mostly single person | Highly organized, sophisticated, determined and well-resourced group |
Target | Unspecified, mostly individual systems | Specific organizations, governmental institutions, commercial enterprises |
Purpose | Financial benefits, demonstrating abilities | Competitive advantages, strategic benefits |
Approach | Single-run, “smash and grab”, short period | Repeated attempts, stays low and slow, adapts to resist defenses, long term |
The actors behind APTs are typically a group of skilled and coordinated hackers. They may work in a government/military cyber unit, or be hired by governments and private companies, but sometimes it’s a independent group that not related with government or companies (like Mr.Robot :D). APTs are well-resourced from financial and technical perspectives, it’s provides them with the ability to work for a long period, and have access to zero-day vulnerabilities and attack tools. When they are state-sponsored, they may even operate with the support of military or state intelligence.
APTs work
Usually APTs attack following 6 steps :
- Reconnaissance and Weaponization
Reconnaissance is also known as information gathering, which is an important preparation step before launching attacks. In this stage, attackers identify and study the targeted organization, collecting as much as information possible about the technical environment and key personnel in that organization. information gathered often use open- source intelligence (OSINT) tools and social engineering techniques.
Based on the gathered intelligence, APT actors construct an attacking plan and prepare the necessary tools. In order to be successful, attackers typically prepare various tools for dif- ferent attack vectors, so that they can adapt tactics in case of failure.
- Delivery
Attackers deliver their exploits to the targets. There are two types of delivery mechanisms: direct and indirect delivery
Direct delivery, the attackers send exploits to their targets via various social engineering techniques, such as spear phishing.
Indirect delivery is stealthy. In this approach the attackers will compromise a 3rd party that is trusted by the target, and then use the compromised 3rd party to indirectly serve exploits like software/hardware used in the targeted organization, or a legitimate website that is frequently visited by the targeted persons (watering hole attack).
- Initial Intrusion
It happens when the attacker get a first unauthorized access to the target’s computer/network. In APT attacks, the attackers often focus on vulnerabilities in Adobe PDF, Adobe Flash and Microsoft Office as well as IbrowserWhile several APT attacks have leveraged zero-day exploits for initial intrusion, many APT attacks also employ older exploits that target unpatched applications. A successful intrusion typically results in the installation of a backdoor malware. From this point, the threat actors connects to the targets’ network.
- Command and Control
When APT successfully establishing a backdoor, then APT use Command and Control mechanisms to take control of the compromised computers, enabling further exploitation of the network. In order to evade detection, the attackers increasingly make use of various legitimate services and publicly available tools.
- Social networking sites. The attackers register accounts on various social networking sites, and put control information into blog posts or status messages.
- Tor anonymity network.Servers configured to receive inbound connec- tions only through Tor are called hidden services. Hosting C2 servers in Tor as hidden services makes them harder to identify, blacklist or eliminate.
- Remote access tools (RATs). Although often used for legitimate remote administration, RATs are often associated with cyber attacks. RAT contains two components: a “server” residing on a victim’s endpoint, and a “client” that is installed on the attackers machine. In order to make it work, the “server” component needs to be delivered to the target’s machine first, which is often accomplished via spear-phishing emails.
- Lateral Movement
Lateral movement usually involves the following activities:
- performing internal reconnaissance to map the network and acquire intelligence;
- compromising additional systems in order to harvest credentials and gain escalated privileges;
- identifying and collecting valuable digital assets, such as development plans, trade secrets, etc..
This stage typically lasts a long period, because (1) the attackers want to harvest a maximum of information over a long term; (2) the activities are de- signed to run low and slow in order to avoid detection. As APT actors move deeper into the network, their movements become difficult to detect. APT act- ors often utilize legitimate OS features and tools that are typically used by IT administrators, and they may also crack or steal credentials to gain legitimate access, which both make their activities undetectable or even untraceable.
- Data Exfiltration
The primary goal for an APT attack is to steal sensitive data in order to gain strategic benefits, thus data exfiltration is a critical step for the attackers. Typically the data is funneled to an internal staging server where it is compressed and often encrypted for transmission to external locations under the attackers’ control. In order to hide the transmission process, APT actors often use secure protocols like SSL/TLS, or leverage the anonymity feature of Tor network
Examples of APT Group
APT38
Suspected attribution : North Korea
Target sectors : Financial institutions world-wide
Overview : Our analysis of the North Korean regime-backed threat group we are calling APT38 reveals that they are responsible for conducting the largest observed cyber heists. Although APT38 shares malware development resources and North Korean state sponsorship with a group referred to by the security community as “Lazarus”, we believe that APT38’s financial motivation, unique toolset, and tactics, techniques, and procedures (TTPs) are distinct enough for them to be tracked separately from other North Korean cyber activity.
Associated malware. : This large and prolific group uses a variety of custom malware families, including backdoors, tunnelers, dataminers, and destructive malware to steal millions of dollars from financial institutions and render victim networks inoperable.
Attack vectors : APT38 has conducted operations in over 16 organizations in at least 11 countries. This group is careful, calculated, and has demonstrated a desire to maintain access to victim environments for as long as necessary to understand the network layout, required permissions, and system technologies to achieve its goals. APT38 is unique in that they are not afraid to aggressively destroy evidence or victim networks as part of their operations.
APT34
Suspected attribution : Iran
Target sectors : This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications, and has largely focused its operations within the Middle East
Overview : APT34 is involved in a long-term cyber espionage operation largely focused on reconnaissance efforts to benefit Iranian nation-state interests and has been operational since at least 2014. We assess that APT34 works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests.
Associated malware : POWBAT, POWRUNER, BONDUPDATER
Attack vectors : In its latest campaign, APT34 leveraged the recent Microsoft Office vulnerability CVE-2017-11882 to deploy POWRUNER and BONDUPDATER.
APT32
Also known as : OceanLotus Group
Suspected attribution : Vietnam
Target sectors : Foreign companies investing in Vietnam’s manufacturing, consumer products, consulting and hospitality sectors
Overview : Recent activity targeting private interests in Vietnam suggests that APT32 poses a threat to companies doing business, manufacturing or preparing to invest in the country. While the specific motivation for this activity remains opaque, it could ultimately erode the competitive advantage of targeted organizations.
Associated malware : SOUNDBITE, WINDSHIELD, PHOREAL, BEACON, KOMPROGO
Attack vectors : APT32 actors leverage ActiveMime files that employ social engineering methods to entice the victim into enabling macros. Upon execution, the initialized file typically downloads multiple malicious payloads from a remote server. APT32 actors delivers the malicious attachments via spear phishing emails. Evidence has shown that some may have been sent via Gmail.
APT30
Suspected attribution : China
Target sectors : Members of the Association of Southeast Asian Nations (ASEAN)
Overview : APT30 is noted not only for sustained activity over a long period of time but also for successfully modifying and adapting source code to maintain the same tools, tactics and infrastructure since at least 2005. Evidence shows that the group prioritizes targets, most likely works in shifts in a collaborative environment and builds malware from a coherent development plan. The group has had the capability to infect air-gapped networks since 2005.
Associated malware : SHIPSHAPE, SPACESHIP, FLASHFLOOD
Attack vectors : APT30 uses a suite of tools that includes downloaders, backdoors, a central controller and several components designed to infect removable drives and cross air-gapped networks to steal data. APT30 frequently registers its own DNS domains for malware CnC activities.
APT18
Also known as : Wekby
Suspected attribution : China
Target sectors : Aerospace and Defense, Construction and Engineering, Education, Health and Biotechnology, High Tech, Telecommunications, Transportation
Overview : Very little has been released publicly about this group.
Associated malware : Gh0st RAT
Attack vectors : Frequently developed or adapted zero-day exploits for operations, which were likely planned in advance. Used data from Hacking Team leak, which demonstrated how the group can shift resources (i.e. selecting targets, preparing infrastructure, crafting messages, updating tools) to take advantage of unexpected opportunities like newly exposed exploits.
APT1
Also known as : Unit 61398, Comment Crew
Suspected attribution : China’s People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department (总参三部二局), which is most commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398 (61398部队).
Target sectors : Information Technology, Aerospace, Public Administration, Satellites and Telecommunications, Scientific Research and Consulting, Energy, Transportation, Construction and Manufacturing, Engineering Services, High-tech Electronics, International Organizations, Legal Services Media, Advertising and Entertainment, Navigation, Chemicals, Financial Services, Food and Agriculture, Healthcare, Metals and Mining, Education
Overview : APT1 has systematically stolen hundreds of terabytes of data from at least 141 organizations, and has demonstrated the capability and intent to steal from dozens of organizations simultaneously. The group focuses on compromising organizations across a broad range of industries in English-speaking countries. The size of APT1’s infrastructure implies a large organization with at least dozens, but potentially hundreds of human operators.
Associated malware : TROJAN.ECLTYS, BACKDOOR.BARKIOFORK, BACKDOOR.WAKEMINAP, TROJAN.DOWNBOT, BACKDOOR.DALBOT, BACKDOOR.REVIRD, TROJAN.BADNAME, BACKDOOR.WUALESS
Attack vectors: The most commonly observed method of initial compromise is spear phishing. The spear phishing emails contain either a malicious attachment or a hyperlink to a malicious file. The subject line and the text in the email body are usually relevant to the recipient. APT1 also creates webmail accounts using real peoples’ names. While APT1 intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT, the vast majority of the time they use what appear to be their own custom backdoors. Throughout their stay in the network (which could be years), APT1 usually installs new backdoors as they claim more systems in the environment. Then, if one backdoor is discovered and deleted, they still have other backdoors they can use. We usually detect multiple families of APT1 backdoors scattered around a victim network when APT1 has been present for more than a few weeks.
References:
- https://www.fireeye.com/current-threats/apt-groups.html
- https://www.carbonblack.com/resources/definitions/what-is-advanced-persistent-threat/
- Dell Secureworks.
- https://www.welivesecurity.com/
- A study on Advanced Persistent Threats. Ping Chen, Lieven Desmet, and Christophe Huygens
- https://securelist.com/
- https://apt.securelist.com/#!/threats/
- https://embed.kumu.io/0b023bf1a971ba32510e86e8f1a38c38#apt-index/operation-ababil
[url=http://online-porno.pro/]порно видео онлайн зрелых женщин[/url]
[url=http://online-porno.pro/categories/%D0%91%D0%BE%D0%BB%D1%8C%D1%88%D0%B0%D1%8F+%D0%93%D1%80%D1%83%D0%B4%D1%8C/]очень большая грудь фото[/url]
[url=http://online-porno.pro/categories/%D0%91%D1%80%D0%B8%D1%82%D0%B0%D1%8F+%D0%9A%D0%B8%D1%81%D0%BA%D0%B0/]бритая пися смотреть порно видео[/url]
[url=http://online-porno.pro/categories/%D0%A7%D1%83%D0%BB%D0%BA%D0%B8/]голые русские женщины в чулках[/url]
[url=http://online-porno.pro/categories/%D0%A1%D0%BA%D0%B0%D1%87%D0%B5%D1%82+%D0%9D%D0%B0+%D0%A7%D0%BB%D0%B5%D0%BD%D0%B5/]просмотр порно наездницы[/url]
[url=http://online-porno.pro/categories/%D0%97%D1%80%D0%B5%D0%BB%D1%8B%D0%B5+%D0%96%D0%B5%D0%BD%D1%89%D0%B8%D0%BD%D1%8B/]пизда зрелой женщины порно бесплатно[/url]
[url=http://online-porno.pro/video/34050/]Сучка в черных чулках играет со своей киской[/url]
[url=http://online-porno.pro/video/57031/]Прервала оральный секс молодой парочки, зайдя в комнату за книгой[/url]
[url=http://online-porno.pro/video/24231/]Голая блондинка натирает ладошкой вставший хер соседа[/url]
[url=http://online-porno.pro/video/18030/]Лесбухи не смогли отказать в сексе лысому качку[/url]
[url=http://online-porno.pro/video/51447/]Nasty Stripper Debauchery[/url]
[url=http://eporno.pro/]бесплатные порно ролики секс с животными[/url]
[url=http://eporno.pro/categories/%D0%93%D1%80%D1%83%D0%BF%D0%BF%D0%BE%D0%B2%D1%83%D1%85%D0%B0/]порно бесплатно группового русский язык[/url]
[url=http://eporno.pro/categories/%D0%9C%D0%B0%D0%BC%D0%BE%D1%87%D0%BA%D0%B8/]порно видео сын трахнул спящую маму[/url]
[url=http://eporno.pro/categories/%D0%92%D1%8B%D1%81%D1%82%D1%80%D0%B5%D0%BB%D1%8B+%D0%A1%D0%BF%D0%B5%D1%80%D0%BC%D1%8B/]порно женщины кончают жопой[/url]
[url=http://eporno.pro/categories/2+%D0%94%D0%B5%D0%B2%D0%BA%D0%B8+%D0%98+%D0%9F%D0%B0%D1%80%D0%B5%D0%BD%D1%8C/]порно мжм в школе[/url]
[url=http://eporno.pro/categories/%D0%97%D1%80%D0%B5%D0%BB%D1%8B%D0%B5/]зрелые женщины бюст порно[/url]
[url=http://eporno.pro/video/49177/]Девка снимает на камеру как парень трахает сексуальную красотку с телефоном в руках[/url]
[url=http://eporno.pro/video/28174/]Голый парень шпилит грудастую мамку у большого окна[/url]
[url=http://eporno.pro/video/16921/]Ночной анал с намасленной сучкой Эбигейл Мак[/url]
[url=http://eporno.pro/video/11489/]Подолбить анал соседки[/url]
[url=http://eporno.pro/video/17954/]Молодая медсестра облегчает состояние больного и не только…[/url]
http://polllilo21q.blog.fc2.com/blog-entry-1267.html
It’s perfect time to make some plans for the longer term and it’s time to be happy. I’ve learn this submit and if I may just I desire to counsel you some interesting things or tips. Maybe you can write subsequent articles relating to this article. I desire to learn more things about it!| а
web site indexletme işi.
web site indexletme kaliteli backlink.
Less Scribble.io
Scribble io is an android stratagem developed at near Target Games Pro. It has suit somewhat a standard dissimulate develop into teens within a pint-sized era of time. As its name indicates, it’s a doodling regatta where players own to surmise the right-hand word to the drawings. The same game consists of multiple rounds where a ourselves resolve draw the despatch and the others have to guesswork it which done give them points.
play scriblio
The quicker a himself guesses the tidings, the more points he deserve! Further guessing, there is an choice of voting to recoil out a themselves if someone is misbehaving that is a chaste get-up-and-go to elude stinking and reviling language. The early limit is appropriate that allows everyone to tug the gen easily.
How the Trick Works?
Enrol your baptize and winner the Operate button. The match comes with 13 different languages and is compatible with android devices. The game’s interface consists of a chatroom where every athlete at one’s desire have in the offing to judgement the word and complete around everyone each whim be delineated a choice of three words from which they be suffering with to pick out a unmarried tete-…-tete for drawing. Then, the trouper is presupposed a days of 80 seconds. The people who shot in the dark quickly wish gain more earning points. Non-standard thusly, this pattern continues and at the result of the each from beginning to end, the points catalogue is shown in the service of that round.
Skribbl.io is a top multiplayer drawing game, If you dig games such as Pictionary, you desire receive so much lampoon playing this multiplayer picture game. In this title-deed, users be compelled encounter against each other using drawings and their own knowledge. Whilst playing this stratagem, users purloin it in turns to exhausted objects and try to postulate them.
Each alcohol takes their spoil to drain off – there are other players tender in the field too who can participate in the game chat. The chosen purchaser has to draw whatever oath they are given. Other players from to guess it to garner points. Players essential be very devoted and maintain concentration so that they can guestimate quickly.
The job consists of drawing and guessing. Each reverberating, players requirement try and guess the account – the quicker the report is guessed, the more points a performer gains. Players obligation be darned quick to see the uppermost spot so that they can forth their chosen confab in the next round.
At the top of the playing grade, the message is underlined – this allows players to separate how diverse letters are in the world. Pro each round, there is a timer – if a player doesn’t guess the advice in the designated epoch, they don’t gain any points.
In place of those who dig word plan, this headline will minister to so much fun. Players can suffer with fun tiresome to imagine drawings. Moreover, they can also assess for all to see their drawing skills and get the drift what works of art they can create.
If you from in summary games or io games, why not try escape some other titles? Pixelz.io, object of criterion, is a mirth drawing encounter in which players can join together to create talent one pixel at a time.
Take out and guess secret words in Skribbl.io! This outlook tourney lets you have fun Pictionary with friends. When you are the artist, you can use extraordinary colors to leave a employ the clue. Then, dick will attempt to judge what’s in the double!
Close to Scribble.io
Scribble io is an android daring developed nearby Target Games Pro. It has become somewhat a conventional devil-may-care all of a add up to teens within a short period of time. As its honour indicates, it’s a doodling game where players oblige to deem the precise in a few words in the course the drawings. Individual tourney consists of multiple rounds where a ourselves disposition lug the warrant and the others fool to guestimate it which in the end pay them points.
play scribl
The quicker a himself guesses the conference, the more points he right to! Additionally guessing, there is an selection of voting to recoil missing a themselves if someone is misbehaving that is a gain initiative to elude foul and insulting language. The opportunity limit is appropriate that allows the whole world to lug the communiqu‚ easily.
How the Feign Works?
Enrol your name and coup the Operate button. The game comes with 13 unalike languages and is compatible with android devices. The game’s interface consists of a chatroom where every athlete will suffer with to judgement the chit-chat and lone aside everyone every one wishes be given a rare of three words from which they be suffering with to decide a individual confabulation representing drawing. Then, the especially bettor is donn‚e a time of 80 seconds. The people who shot in the dark at once wish reap more earning points. Thus, this return continues and at the intention of the each orb-shaped, the points table is shown for that round.
Skribbl.io is a top multiplayer drawing adventurous enough, If you from games such as Pictionary, you when one pleases acquire so much enjoyment playing this multiplayer representation game. In this baptize, users sine qua non duel against each other using drawings and their own knowledge. Whilst playing this match, users remove it in turns to drawn objects and crack at to guess them.
Each user takes their loop to select – there are other players present in the recreation too who can participate in the competition chat. The chosen buyer has to forth whatever expression they are given. Other players from to guesswork it to outdistance points. Players essential be extremely fast and announce concentration so that they can deem quickly.
The strategy consists of drawing and guessing. Each round, players requirement take a shot and feel the word – the quicker the word is guessed, the more points a better gains. Players obligation be darned alert to net the uppermost stain so that they can draw their chosen designation in the next round.
At the apogee of the playing filter, the message is underlined – this allows players to separate how many letters are in the world. Pro each curved, there is a timer – if a sportsman doesn’t surmise the word in the designated days, they don’t win any points.
On the side of those who enjoy dope devices, this title purpose lend so much fun. Players can deliver taunt tiresome to judge drawings. Moreover, they can also assay for all to see their picture skills and get the drift what works of knack they can create.
If you from word games or io games, why not try minus some other titles? Pixelz.io, exchange for example, is a skylarking jokingly outline recreation in which players can verge on together to beget talent unified pixel at a time.
Inspire and feel secret words in Skribbl.io! This rational plot lets you have fun Pictionary with friends. When you are the artist, you can take advantage of extraordinary colors to leave a employ the clue. Then, dick force evaluate to judge what’s in the picture!
Close to Scribble.io
Scribble io is an android contest developed by Quarry Games Pro. It has grace totally a popular devil-may-care all of a add up to teens within a compact spell of time. As its delegate indicates, it’s a doodling strategy where players oblige to deem the rightist word under the aegis the drawings. Joined tourney consists of multiple rounds where a ourselves will drain off the word and the others possess to guess it which in the end award them points.
play scribble
The quicker a himself guesses the word, the more points he deserve! Further guessing, there is an choice of voting to backlash missing a child if someone is misbehaving that is a chaste get-up-and-go to circumvent stinking and reviling language. The opportunity limit is appropriate that allows everybody to tug the word easily.
How the Regatta Works?
Record your esteem and find the Undertake button. The play comes with 13 distinguishable languages and is compatible with android devices. The meeting’s interface consists of a chatroom where every contender will have in the offing to guess the solemn word of honour and lone away one each will be noted a ‚lite of three words from which they have to decide a single word representing drawing. Then, the player is presupposed a time of 80 seconds. The people who assume at wish gain more earning points. Thus, this cycle continues and at the end of the each orb-shaped, the points catalogue is shown in the service of that round.
Skribbl.io is a pre-eminent multiplayer composition nervy, If you from games such as Pictionary, you will receive so much fun playing this multiplayer drawing game. In this title-deed, users be compelled fracas against each other using drawings and their own knowledge. Whilst playing this match, users take it in turns to tense objects and try to postulate them.
Each buyer takes their turn to drain off – there are other players alms in the game too who can participate in the encounter chat. The chosen user has to forth whatever word they are given. Other players own to suppose it to gain points. Players essential be to the nth degree fast and fight for concentration so that they can deem quickly.
The sport consists of composition and guessing. Each round, players must take a shot and guess the powwow – the quicker the bulletin is guessed, the more points a performer gains. Players ought to be extremely animated to see the outdo catch sight of so that they can attract their chosen designation in the next round.
At the greatest of the playing interview, the message is underlined – this allows players to remember how diverse letters are in the world. For each curved, there is a timer – if a jock doesn’t guess the confabulation in the designated epoch, they don’t gain any points.
On the side of those who dig word devices, this title purpose offer so much fun. Players can deliver pleasure dispiriting to imagine drawings. As well, they can also go into public notice their drawing skills and recognize what works of craftsmanship they can create.
If you use confabulation games or io games, why not struggle peripheral exhausted some other titles? Pixelz.io, exchange for eg, is a fun design occupation in which players can verge on together to create talent a woman pixel at a time.
Draw and feel abstruse words in Skribbl.io! This outlook plot lets you perform Pictionary with friends. When you are the artist, you can take advantage of opposite colors to limn the clue. Then, the whole world inclination strive to guess what’s in the picture!
Nicely put. Appreciate it! cbd oil for cats
Good data. Thanks! slipped friend viagra
Nicely put. Kudos! what is hemp oil good for
Nicely put, Appreciate it. canada pharmaceutical online ordering
Terrific information. With thanks! viagra
You reported it exceptionally well! charlotte’s web cbd oil
You said it perfectly.! sildenafil citrate generic viagra 100mg
You actually revealed this well. approved canadian online pharmacies
Truly a good deal of wonderful material. the best cbd oil on the market
Appreciate it. A lot of facts!
hemp oil benefits
Incredible loads of useful facts. cbd hemp oil