The emerging trends in the landscape of APT attacks

The World Research and Analysis Group of the Kaspersky Lab has revealed some of the biggest threats campaigns APT (Advanced Persistent Threat), As the RedOctober, This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. Flame, This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. NetTraveler, This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. Miniduke, This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. EpicTurla, This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. Careto/Mask and others.lock security

Watching closely over 60 threat agents, who were responsible for digital attacks at a global level, the team of specialists of the company has written a a list of top emerging trends in the landscape of APT attacks. These include:APT-Attacks

Fragmentation of larger APT groups: An increasing number of smaller threats is likely to lead to more attacks targeting businesses. Additionally, larger organizations are expected to face more attacks from a wider range of sources.

The proliferation of ART attacks in the "world" of digital criminals: The days when gangs of digital criminals focused exclusively on the theft of money by end-users have passed. Criminals are now directly attacking banks because that's where the money is. For this reason, they use APT techniques to implement complex attacks.

Targeting executives through hotel networks: Hotels are the perfect place to target high-ranking executives. OR team behind Darkhotel is one of the ART attacks that has been known to have turned against particular visitors during their stay in hotels.

Enhanced escape techniques: More and more APT groups will be concerned about the disclosure of their information. That is why they will take more advanced measures to protect their identity.

New data filtering methods: 2015, more teams are expected to use cloud services to make data editing (unauthorized data transfer from a computer) more unnoticed and more difficult to detect.

The use of "false flag": APT groups are expected to take advantage of the authorities' intention to “uncover the and deport" those suspected of attacks, using "false flag" methods, through which it will appear that the attack was carried out by some other person or entity.

"If 2014 can say that the attacks were" advanced, "then the evolution of 2015 can be said to be" inconceivable ". We believe that APT teams will evolve and become more "silent" and insidious in order to avoid their possible exposure. This year, we have already discovered APT agents using several zero-days software. We have also noticed new persistent and "silent" techniques. We have used these findings to develop and implement several new defense mechanisms for our product users, commented Costin Raiu, Director of Kaspersky Lab's Worldwide Research and Development Team.

More information on new trends in APT threats is available at Securelist blog.

Also, in YouTube you can watch a Kaspesky Lab video on the above issues.

For more information on key events that marked the threat landscape in 2014, please visit the Securelist.com.

In addition, Kaspersky Lab today launches the interactive “Targeted Cyber ​​attack Logbook”, an online journal that records all complex digital campaigns or APT-type threats that have been investigated by the company's Global Research and Analysis Team. More details are available at apt.securelist.com.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).