From the course: Ethical Hacking: The Complete Malware Analysis Process

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Understanding advanced persistent threats

Understanding advanced persistent threats

From the course: Ethical Hacking: The Complete Malware Analysis Process

Start my 1-month free trial

Understanding advanced persistent threats

- [Instructor] A good source of information on APTs is Kaspersky Labs. Here we see the Kaspersky APT site. If we scroll down to the lower screen, we can see the various APTs. Let's have a look at Stuxnet. If we click on it, we get some basic facts. If we click on Go To The Threat, we can also see the other APTs which relate to it. Let's have a look at another called Lamberts and go to the threat. We can see this targets a much wider geographical area than Stuxnet. If we scroll down, we can see a link to more information. And this takes us to an analysis of the APT. Defending against APTs is difficult, and it's likely that an APT attack will succeed. APTs usually are found when network monitoring detects the installed malware attempting to connect to its command and control systems. Focusing controls which address each stage of the Cyber Kill Chain provides the opportunity for early detection. Nevertheless, the average time it takes to detect an APT is measured in months. Advanced…

Contents