CSO's guide to Advanced Persistent Threats

In this series of articles, we examine the processes, tools, and methods used by criminals during a targeted attack

APTs are both nightmares and the stuff of legend for business leaders and security managers across the globe. Advanced Persistent Threat, or APT, is one part marketing and one part generic description. APT-based incidents are hard, if not outright impossible to prevent, making them the type of incident that often requires well-defined response and recovery plans, with the objective being harm reduction and loss mitigation. This is because it's an unfortunately reality that once an APT-based incident has been discovered, it's often the case that's too late to do anything else.

In this series, we examine the processes, tools, and methods used by criminals during a targeted attack. In addition, we define the difference between an actual APT event and a passive attack, something both the media and various sales and marketing teams confuse. Overall, the takeaway is that it's entirely possible to defend against attacks of all types and sizes, but it isn't easy.

The topics covered in this guide are reconnaissance,weaponization and delivery, exploitation and installation, command and control, and exfiltration. *Please note that CSO Insider registration is required to access all parts of this series.*

CSO's guide to the processes and tools behind a true APT campaign:The processes and tools behind a true APT campaign: Overview The processes and tools behind a true APT campaign: Reconnaissance The processes and tools behind a true APT campaign: Weaponization and delivery The processes and tools behind a true APT campaign: Exploitation and Installation The processes and tools behind a true APT campaign: Command & Control The processes and tools behind a true APT campaign: Exfiltration

To comment on this article and other CSO content, visit our Facebook page or our Twitter stream.
Insider: Hacking the elections: myths and realities
Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.