{"id":15115,"date":"2015-11-19T17:44:25","date_gmt":"2015-11-19T17:44:25","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4821"},"modified":"2019-11-15T07:00:37","modified_gmt":"2019-11-15T12:00:37","slug":"apt-predictions-for-2016-there-will-be-no-more-apts-oh-wait","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/apt-predictions-for-2016-there-will-be-no-more-apts-oh-wait\/15115\/","title":{"rendered":"APT Predictions for 2016: There will be no more APTs! Oh, wait&#8230;"},"content":{"rendered":"<p>APT will go away soon, said Kaspersky Lab\u2019s GReAT team. Unfortunately this news wasn\u2019t\u00a0a quantum of solace.<\/p>\n<p>In their predictions for 2016, the GReAT team said that APTs will be replaced by deeper, embedded attacks that are harder to detect and trace back to the perpetrators. APT stands for \u201cAdvanced Persistent Threat\u201d. Cybercriminals, GReAT predicted, will gladly drop both the \u201cadvanced\u201d and \u201cpersistent\u201d elements for the sake of overall stealth.<\/p>\n<p>\u201cWe expect to see a decrease in the emphasis on persistence, placing a greater focus on memory-resident or fileless malware. The idea will be to reduce the traces left on an infected system and thus avoid detection altogether\u201d, authors said.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#APT Predictions for 2016: There will be no more APTs! Oh, wait\u2026<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FA6sZ&amp;text=%23APT+Predictions+for+2016%3A+There+will+be+no+more+APTs%21+Oh%2C+wait%26%238230%3B\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Another approach will be to reduce the emphasis on advanced malware. Rather than investing in bootkits, rootkits, and custom malware, an increase in the repurposing of off-the-shelf malware is expected \u2013 simply to minimize the initial investment.<\/p>\n<p>As with any other business, illicit or legitimate, cybercriminals and other threat actors are extremely interested in keeping costs as low as possible, thus maximizing ROI.<\/p>\n<p>This may mean that the number of actors at the APT theater will grow. As the methods and techniques of APTs become more and more generally available, along with the appropriate off-the-shelf tools, there will be a definite switch towards money-earning.<\/p>\n<p>\u201c2016 will\u2026 see more players entering the world of cyber-crime. The profitability of cyber-attacks is indisputable and more people want a share of the spoils. As mercenaries enter the game, an elaborate outsourcing industry has risen to meet the demands for new malware and even entire operations. The latter gives rise to a new scheme of Access-as-a-Service, offering up access to already hacked targets to the highest bidder,\u201d said Juan Andr\u00e9s Guerrero-Saade, Senior Security Expert, Global Research and Analysis Team, Kaspersky Lab.<\/p>\n<p>It is also predicted that a number of cyber-mercenaries will grow, and they will start offering \u201caccess-as-a-service\u201d \u2013 digital access into the infrastructure of high-profile victims to anyone willing to pay for it.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#2016 is predicted to be a year of a cyber-mercs<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FA6sZ&amp;text=%232016+is+predicted+to+be+a+year+of+a+cyber-mercs\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Businesses are recommended to take a number of steps to protect themselves as soon as possible (if they haven\u2019t yet done so):<\/p>\n<p>Actions a business should take today:<\/p>\n<ul>\n<li>Focus on cybersecurity education for staff.<\/li>\n<li>Ignore the detractors and implement mature, multi-layered Endpoint protection with extra proactive layers<\/li>\n<li>Patch vulnerabilities early, patch often, and automate the process<\/li>\n<li>Mind everything that\u2019s mobile<\/li>\n<li>Implement encryption for communications and sensitive data<\/li>\n<li>Protect all elements of the infrastructure \u2013 gateways, email, collaboration<\/li>\n<\/ul>\n<p>It is also recommended to create and deploy a complete security strategy \u2013 Prediction, Prevention, Detection, Response. Creating a dedicated Security Operations Center separated from generic IT, may be extremely beneficial as well.<\/p>\n<p>Full report is available <a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/72771\/kaspersky-security-bulletin-2016-predictions\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In their predictions for 2016, the GReAT team said that APTs will be replaced by deeper, embedded attacks that are harder to detect and trace back to the perpetrators.<\/p>\n","protected":false},"author":209,"featured_media":15390,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[499,605],"class_list":{"0":"post-15115","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-great"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/apt-predictions-for-2016-there-will-be-no-more-apts-oh-wait\/15115\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/apt-predictions-for-2016-there-will-be-no-more-apts-oh-wait\/9737\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/apt-predictions-for-2016-there-will-be-no-more-apts-oh-wait\/15115\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/apt-predictions-for-2016-there-will-be-no-more-apts-oh-wait\/15115\/"}],"acf":[],"banners":"","maintag":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15115"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15115\/revisions"}],"predecessor-version":[{"id":30367,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15115\/revisions\/30367"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15390"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}