Advanced persistent threats (APTs) use
sophisticated, blended techniques that leverage both web and email
channels to deliver malware that has never been seen before and can
live undetected for months. APTs are targeted, multifaceted, ongoing
efforts designed to elude traditional defenses of signature-based
antivirus and firewalls for the theft of intellectual property and
confidential data in a government setup or large enterprises. Some of
the most prominent examples of APTs include Aurora, Flame,
Stuxnet, Nitro, Night Dragon and Duqu.
APTs are also a prototype for other targeted attacks that are now victimizing enterprises of all shapes and sizes. For example, the same APT technology used by China to hack Google, Adobe, and approximately 30 other companies in Aurora Internet Explorer Zero-Day Attack is now being used by cybercriminals to steal data from other organizations as well. Stuxnet which infected Iran’s uranium enrichment centrifuges can be a source of inspiration for cyber…
APTs are also a prototype for other targeted attacks that are now victimizing enterprises of all shapes and sizes. For example, the same APT technology used by China to hack Google, Adobe, and approximately 30 other companies in Aurora Internet Explorer Zero-Day Attack is now being used by cybercriminals to steal data from other organizations as well. Stuxnet which infected Iran’s uranium enrichment centrifuges can be a source of inspiration for cyber…