SafeUM
Home Blog Services Download Help About Recharge

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
Archive
TOP Security!
25 Feb 2015

Everything you need to know about APT attacks

Nowadays, we talk a lot about malware that invades our daily activities. Some are more dangerous than others — whether they target private users or companies. Organizations are also threatened by attacks for their intellectual property, which is a key element in the functionality of a business.

Advanced persistent threats (APTs) are among the most dangerous that exist in the computing world. Earlier, security researchers have uncovered the first ever Arabic language advanced persistent threat group, called Desert Falcons.

Let's discuss the characteristics of these attacks and the way organizations and individuals can protect themselves against them. Advanced Persistent Threats — quite an intimidating name, isn’t it? “Advanced” because the tools used in these attacks are more sophisticated than those usually used by cybercriminals. “Persistent” because once a breach is created in an organization, it can last for months or even for years in certain cases. These attacks mainly target companies.

Nevertheless, home users are not safe either — you may not be an interesting target, but you still might be useful for cybercriminals who could then target your friend or a member of your family who holds an important position in a company. The damage caused by these attacks is much more important than the damage caused by simple malware — “they use different vectors, different types of exploits, different types of vulnerabilities to access companies’ sensitive data”. However, you may be wondering, what do cybercriminals actually target with this type of attack?

Major target is the intellectual property

Most companies store their important data within their networks. Patents, innovative designs, models and even sensitive or confidential data — everything is stored there. The main target of APT attacks is intellectual property. Criminals identify an employee who has access to sensitive data — and preferably, someone who is not aware of all these security issues — in order to infiltrate the network and collect all the data that is stored on his/her computer.

“If you have this kind of data within your company, you should be aware of these types of threats and put in place all the necessary means that exist nowadays to protect these intellectual properties,” experts warned. But criminals can go beyond espionage; they can cause serious damage and paralyze the entire functioning of the targeted company. Now that we’ve established this fact, you are probably wondering how and with what tools companies can protect themselves from these attacks.

No silver bullet, but some means to fight back

The first thing to know is that, as experts explained, there’s no “silver bullet” solution. Nevertheless, each of them gave us some advice in order to minimize the risks as much as possible. There’s no magic recipe, but some behaviours and processes should be implemented according to Jaime Blasco: “You obviously need certain technologies to protect yourself from these threats, but for me, the solution is a combination of processes, technologies and human actions. Prevention and education are the most important factors.” Costin Raiu added that “studying the victims of APTs is also very useful. Doing so, we notice that 95% of these attacks target companies with security standards that are not strict enough.

They don’t know the risks or the practices in terms of security, they don’t install the latest patches nor do they use antivirus software. And they get compromised. First of all, companies need to make sure they have the latest patches, the latest operating system and that they use a safe browser with the latest patches installed. We also need to educate users. If you manage to gather all these ingredients, you will be better protected against targeted attacks.” As far as Neil Thacker is concerned, “it is also essential to educate certain employees.” This education must be given at all levels of the organization. Don’t underestimate cybercriminals, if you know about the risks and you’ve taken all the necessary precautions, they won’t hesitate to target some of your less cautious partners and use them to reach you.

To conclude, it is safe to say that the targeted attacks or APTs will keep on existing and expanding as long as companies have attractive data. There’s no miracle solution, but prevention and education within companies seems to be the first step towards increased security, therefore, you should always remain vigilant.

OUR POINT
If you really want to protect your personal information and confidential data, do not believe suspicious servers, especially when it comes to business. In some cases, business is based on certain information that is not publicly available, but is of great interest to attackers. Commercial information is the main target of APTs.

SafeUM will create a perfect and secure communication environment for all loyal users. We also place big bets on companies and corporations providing them with convenient opportunities for groups administration and management. We understand that business is becoming more global now and top managers from different countries feel the need to safely discuss strategic issues, that’s why we have created a number of additional innovative features for corporate use of SafeUM secure messenger. Your communication and conversations privacy will be secure excluding any possibility of being decrypted. All files, messages and voice calls may be sent in P2P (Person to Person) mode bypassing our servers.
Tags:
APT information leaks
Source:
Kaspersky Daily
Author:
Sebastien Bequerel
2752
Other NEWS
3 Jul 2020 safeum news imgage An encrypted messaging service has been infiltrated by police
4 May 2020 safeum news imgage Two-Factor Authentication ​What Is It and Why You Should Use It
12 Dec 2019 safeum news imgage Encryption is under threat - this is how it affects you
4 Nov 2019 safeum news imgage Should Big Decisions Be Based on Data or Your Intuition?
7 Jun 2018 safeum news imgage VPNFilter malware infecting 500,000 devices is worse than we thought
4 Jun 2018 safeum news imgage Hackers target Booking.com in criminal bid to steal hundreds of thousands from customers
1 Jun 2018 safeum news imgage Operator of World's Top Internet Hub Sues German Spy Agency
30 May 2018 safeum news imgage US says North Korea behind malware attacks
29 May 2018 safeum news imgage Facebook and Google targeted as first GDPR complaints filed
25 May 2018 safeum news imgage A new reason to not buy these cheap Android devices
24 May 2018 safeum news imgage Flaws in smart pet devices, apps could come back to bite owners
23 May 2018 safeum news imgage Google sued for 'clandestine tracking' of 4.4m UK iPhone users' browsing data
21 May 2018 safeum news imgage LocationSmart reportedly leaked phone location data onto the web
18 May 2018 safeum news imgage The SEC created its own scammy ICO to teach investors a lesson
17 May 2018 safeum news imgage Thieves suck millions out of Mexican banks in transfer heist
All news
SafeUM
Confidential Terms of Use Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015