{"id":15042,"date":"2014-12-18T18:13:19","date_gmt":"2014-12-18T18:13:19","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3440"},"modified":"2020-02-26T10:58:35","modified_gmt":"2020-02-26T15:58:35","slug":"the-distant-ships-under-the-horizon-kaspersky-lab-launches-apts-monitoring-tool","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/the-distant-ships-under-the-horizon-kaspersky-lab-launches-apts-monitoring-tool\/15042\/","title":{"rendered":"The distant ships under the horizon: Kaspersky Lab launches APTs monitoring tool"},"content":{"rendered":"<p>Kaspersky Lab has launched a new visual tool dedicated to real-time monitoring of APTs \u2013 <a href=\"https:\/\/apt.securelist.com\/\" target=\"_blank\" rel=\"noopener\">\u201cTargeted Attacks Logbook\u201d<\/a>.<\/p>\n<p style=\"text-align: center;\">\n<\/p><p>Aside from looking extremely pretty, it provides brief, yet exhaustive data on every advanced persistent threat known today. Let\u2019s take a look at what it offers and how it works:<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#TargetedAttacksLogbook: new visual tool by @Kaspersky<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F4mi2&amp;text=%23TargetedAttacksLogbook%3A+new+visual+tool+by+%40Kaspersky+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The first screen shows the APTs as a large fleet of military vessels afloat over time, with their stern wakes\u2019 length indicating how long the threat has been active. The length of the vessel is a time period between its discovery and \u201ccurrent status\u201d \u2013 i.e. is it currently active or not. Those with bows ahead in 2014 are still active, the rest are not. Unfortunately, most of them are active now, including the last one disclosed \u2013 <a href=\"https:\/\/securelist.com\/blog\/research\/67741\/regin-nation-state-ownage-of-gsm-networks\/\" target=\"_blank\" rel=\"noopener\">Regin<\/a> campaign, which was discovered back in 2012, and apparently had been active since 2003.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/12\/06020231\/all_apts-1-1024x503.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3446\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/12\/06020231\/all_apts-1.png\" alt=\"all_apts\" width=\"1920\" height=\"943\"><\/a><\/p>\n<p>Now, if we roll the mouse over certain \u201cvessels\u201d, for instance that pretty <a href=\"https:\/\/securelist.com\/blog\/incidents\/34344\/the-flame-questions-and-answers-51\/\" target=\"_blank\" rel=\"noopener\">Flame<\/a> motor boat, we will see the ties between this particular APTs and some others \u2013 Gauss, Duqu, miniFlame and Stuxnet, with the last one looking a lot like a submarine.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/12\/06020230\/all_apts-2-1024x503.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3446\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/12\/06020230\/all_apts-2.png\" alt=\"all_apts\" width=\"1920\" height=\"943\"><\/a><\/p>\n<p>As we all know, if it wasn\u2019t for a coding mistake, <a href=\"https:\/\/securelist.com\/blog\/events\/33206\/the-day-the-stuxnet-died-27\/\" target=\"_blank\" rel=\"noopener\">Stuxnet<\/a> would have never been discovered and the history of APTs would look a bit different \u2013 although at least two of the APTs were known earlier: <a href=\"https:\/\/securelist.com\/blog\/virus-watch\/58551\/agent-btz-a-source-of-inspiration\/\" target=\"_blank\" rel=\"noopener\">Agent.btz<\/a> and <a href=\"https:\/\/securelist.com\/analysis\/quarterly-malware-reports\/36303\/information-security-threats-in-the-first-quarter-of-2010\/\" target=\"_blank\" rel=\"noopener\">Aurora<\/a>. Agent.btz, by the way, has certain links to Epic Turla, the big bad campaign, that is still becoming bigger and, well, \u201cbadder\u201d as new data arrives.<\/p>\n<p>If we click on Epic Turla, we\u2019ll see its status, type, time of discovery, longevity, number of targets, targeted platforms, and a map of the most affected countries.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/12\/06020229\/epic_turla-1-1024x503.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3441\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/12\/06020229\/epic_turla-1.png\" alt=\"epic_turla\" width=\"1920\" height=\"944\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p>Below is additional data on the threat, including the way of propagation, purpose, special features and identified targets along with artifacts that point to possible attribution.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/12\/06020228\/Epic-Turla-1-1024x1024.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3438\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/12\/06020228\/Epic-Turla-1.png\" alt=\"Epic-Turla\" width=\"1034\" height=\"1034\"><\/a><\/p>\n<p>And then there is a link to <a href=\"https:\/\/securelist.com\/analysis\/publications\/65545\/the-epic-turla-operation\/\" target=\"_blank\" rel=\"noopener\">Securelist\u2019s detailed research on the threat.<\/a><\/p>\n<p>Back to the main screen, we see a \u201cfilter\u201d that allows us to pick out the APTs based on a number of features. For instance, if we want to see what APTs are targeting iOS \u2013 quite an exotic query, right? \u2013 we can set this preference and we\u2019ll see two \u201cdestroyers\u201d and one \u201cmissile boat\u201d:<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/12\/06020227\/iOS_APT-1-1024x506.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3442\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/12\/06020227\/iOS_APT-1.png\" alt=\"iOS_APT\" width=\"1920\" height=\"949\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p>These are <a href=\"https:\/\/securelist.com\/analysis\/publications\/36996\/mobile-malware-evolution-part-6\/\" target=\"_blank\" rel=\"noopener\">FinSpy<\/a>, <a href=\"https:\/\/securelist.com\/analysis\/publications\/37064\/spyware-hackingteam\/\" target=\"_blank\" rel=\"noopener\">Hacking Team RCS<\/a>, and the newly discovered <a href=\"https:\/\/securelist.com\/blog\/research\/68083\/cloud-atlas-redoctober-apt-is-back-in-style\/\" target=\"_blank\" rel=\"noopener\">Cloud Atlas<\/a> \u2013 the successor to notorious <a href=\"https:\/\/securelist.com\/analysis\/publications\/36740\/red-october-diplomatic-cyber-attacks-investigation\/#8\" target=\"_blank\" rel=\"noopener\">RedOctober APT<\/a>. All three are targeting iOS devices among other platforms. And Hacking Team RCS appears to have been active since 2008.<\/p>\n<p>The term \u2018APT\u2019 was coined back in 2006, but despite attempts to make it clear and exhaustive, it is still quite vague. This is largely because the term Advanced Persistent Threat was meant to designate attacking entities \u2013 hacking groups, hostile cyber warfare units, etc., but the term has somewhat slid towards designating the malware used by APT groups and the campaigns they wage, correctly or not.<\/p>\n<p>We previously published a couple of blogposts [<a href=\"https:\/\/business.kaspersky.com\/a-laymans-dictionary-what-is-apt-and-why-is-it-called-that\/2711\" target=\"_blank\" rel=\"noopener nofollow\">1<\/a>, <a href=\"https:\/\/business.kaspersky.com\/what-is-apt-and-why-is-it-dangerous-for-businesses\/1286\" target=\"_blank\" rel=\"noopener nofollow\">2<\/a>] explaining what APTs are.<\/p>\n<p>In a nutshell an APT is a threat posed by skilled, motivated, organized, and well-funded cyber-attackers. It is called \u201cadvanced\u201d since operators behind the threat have a full spectrum of intrusion, intelligence-gathering, and data stealing tools at their disposal. These tools are usually custom-made, although partial \u201ccode intercrossing\u201d between different APTs isn\u2019t uncommon.<\/p>\n<p>It is also called persistent because attackers give priority to a specific task such as exfiltration of certain data from particular entities. They don\u2019t seek information opportunistically, as common criminals do. Besides, the attacks are anything but one-offs: usually they are continuous, staying active for years, as illustrated above. Operators prefer a stealthy, hushed approach, and they try to keep access to the target\u2019s infrastructure for as long as possible without being discovered.<\/p>\n<p>Kaspersky Lab experts assume that <a href=\"https:\/\/business.kaspersky.com\/the-crystal-ball-of-facts-2015-apt-predictions\/3417\" target=\"_blank\" rel=\"noopener nofollow\">in the near future, a wider range of cybercriminals will adopt APT tactics<\/a> since the continuous malicious presence in the compromised infrastructure may bring a larger profit than the one-off attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab launches &#8220;Targeted Attacks Logbook&#8221; &#8211; a visual tool to monitor known Advanced Persistent Threats. In this post, we take a look at how to handle this pretty instrument.<\/p>\n","protected":false},"author":209,"featured_media":15807,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2258,2262,2263,2264],"class_list":{"0":"post-15042","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apts","10":"tag-epic-furla","11":"tag-targeted-attacks-logbook","12":"tag-visual-tools"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/the-distant-ships-under-the-horizon-kaspersky-lab-launches-apts-monitoring-tool\/15042\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/the-distant-ships-under-the-horizon-kaspersky-lab-launches-apts-monitoring-tool\/7032\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/the-distant-ships-under-the-horizon-kaspersky-lab-launches-apts-monitoring-tool\/15042\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/the-distant-ships-under-the-horizon-kaspersky-lab-launches-apts-monitoring-tool\/15042\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apts\/","name":"APTs"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15042"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15042\/revisions"}],"predecessor-version":[{"id":33419,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15042\/revisions\/33419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15807"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}