{"id":2050,"date":"2013-06-11T10:00:00","date_gmt":"2013-06-11T14:00:00","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=2050"},"modified":"2020-02-26T10:40:05","modified_gmt":"2020-02-26T15:40:05","slug":"apt","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/apt\/2050\/","title":{"rendered":"What is APT?"},"content":{"rendered":"<p>APT stands for advanced persistent threat. It became famous following a New York Times expos\u00e9 detailing <a href=\"https:\/\/threatpost.com\/inside-targeted-attack-new-york-times-013113\/\" target=\"_blank\" rel=\"noopener nofollow\">a month\u2019s long attack campaign<\/a> in which a Chinese military unit now known as \u201cAPT 1\u201d thoroughly penetrated the media organization\u2019s networks with a series of spear-phishing emails and a deluge of customized malware samples.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/06\/06050602\/apt_title.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2051\" alt=\"apt_title\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/06\/06050602\/apt_title.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>There are two ways to look at it: APT as a thing and APT as people. On the one hand, an advanced persistent threat refers to a highly precise sort of cyberattack. On the other hand, advanced persistent threat can also refer to the groups, often state sponsored or well-funded in other ways, that are responsible for launching such precision attacks.<\/p>\n<p>Truly advanced persistent threats are a bit counter-intuitive. When you think about most cybercriminals and other spreaders of malware, you think that their goal is to infect as many computers as possible with their credential pilfering, botnet building, or other malicious software. The wider the net, the more opportunity for stealing money, computing resources, or whatever it is they\u2019re after. APT actors on the other hand are interested in infecting the machines of particular people.<\/p>\n<div class=\"pullquote\">The point is: you don\u2019t have to be the CEO in order to be a potential APT target. Nearly anyone with an internet connection is a potential target.<\/div>\n<p>The end-goal of an APT-style attack is to compromise a machine on which there is some sort of valuable information. It would be an obvious success if an attacker managed to load <a href=\"https:\/\/www.kaspersky.com\/blog\/keylogger\/\" target=\"_blank\" rel=\"noopener nofollow\">a keylogger<\/a> or install a backdoor onto the machine of the chief executive or information officer of a prominent company, but you\u2019ve got to wake up pretty early in the morning to trick one of these guys or gals. They\u2019re smart. They have security teams and tools looking out for them. In other words, it may just be too hard to hack these enterprising individuals.<\/p>\n<p>So instead of targeting the CEO, APT groups often choose to target some lesser employee, like a copy-writer or graphic designer, who may not have particularly valuable information on his or her machine but is on the same network as machines with valuable data and could potentially be used as a stepping stone toward infecting valuable machines. To recap: compromise the copy-writer\u2019s machine and use his or her email address to spear-phish the CEO.<\/p>\n<p>Even this tactic often proves too difficult as companies continue investing more money <a href=\"https:\/\/usa.kaspersky.com\/business-security\" target=\"_blank\" rel=\"noopener\">on corporate security products<\/a> and employee <a href=\"http:\/\/blog.kaspersky.com\" target=\"_blank\" rel=\"noopener nofollow\">education<\/a>. APT hackers now resort to choosing increasingly obscure targets in an attempt to daisy chain a complicated sequence of infections that eventually yields valuable data. For example, maybe your great uncle is a bigwig at Boeing or you work as an engineer at a highly specialized design firm that develops a certain exhaust component that Boeing uses in one if it\u2019s jetliners. APT groups might target you as a starting point that could eventually lead to the compromise that yields secrets.<\/p>\n<p>The point is: you don\u2019t have to be the CEO in order to be a potential APT target. Nearly anyone with an internet connection is a potential target.<\/p>\n<p>Just last week Kaspersky analysts\u00a0uncovered an <a href=\"http:\/\/www.securelist.com\/en\/blog\/8105\/NetTraveler_is_Running_Red_Star_APT_Attacks_Compromise_High_Profile_Victims\" target=\"_blank\" rel=\"noopener nofollow\">APT-style espionage campaign called \u201cNetTraveler\u201d<\/a> that may-well have spanned the better part of a decade <a href=\"https:\/\/threatpost.com\/net-traveler-espionage-campaign-uncovered-links-to-gh0st-rat-titan-rain-found\/\" target=\"_blank\" rel=\"noopener nofollow\">targeting diplomats, military contractors and government agencies in 40 countries<\/a>. This attack, like many APT-style attacks, began with a spear-phishing email that <a href=\"https:\/\/www.kaspersky.com\/blog\/exploit\/\" target=\"_blank\" rel=\"noopener nofollow\">exploited<\/a> a couple known Microsoft vulnerabilities. Eventually the attackers deployed a tool capable of extracting system information, dropping keylogging malware, stealing Office documents such as Word, Excel and PowerPoint files, and modifying configurations to steal Corel Draw designs, AutoCAD files and other file types used in manufacturing and defense circles. This attack should be considered an advanced persistent threat because it seems to have only targeted individuals and organizations whose computers would contain valuable secrets. As I mentioned above, APT can also refer to hacker or attack groups. In this case, the APT group is a prolific one. Perhaps not quite as prolific as the notorious Comment Crew (aka APT 1), but Kaspersky Lab researchers claim that whoever launched NetTraveler is likely responsible for the <a href=\"https:\/\/threatpost.com\/titan-rain\/\" target=\"_blank\" rel=\"noopener nofollow\">Titan Rain<\/a> and<a href=\"https:\/\/threatpost.com\/ghostnet-shows-extent-online-spying-033009\/\" target=\"_blank\" rel=\"noopener nofollow\"> GhostNet<\/a> attacks as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>APT stands for advanced persistent threat. It became famous following a New York Times expos\u00e9 detailing a month\u2019s long attack campaign in which a Chinese military unit now known as<\/p>\n","protected":false},"author":42,"featured_media":2052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[282,36,413],"class_list":{"0":"post-2050","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-cybersecurity","9":"tag-malware-2","10":"tag-online-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/apt\/2050\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/apt\/2050\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/apt\/2050\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/apt\/2050\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/apt\/2050\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/apt\/2050\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/apt\/2050\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2050"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2050\/revisions"}],"predecessor-version":[{"id":32799,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2050\/revisions\/32799"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2052"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}