{"id":2711,"date":"2014-10-09T19:30:58","date_gmt":"2014-10-09T19:30:58","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2711"},"modified":"2020-02-26T10:56:34","modified_gmt":"2020-02-26T15:56:34","slug":"a-laymans-dictionary-what-is-apt-and-why-is-it-called-that","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/a-laymans-dictionary-what-is-apt-and-why-is-it-called-that\/2711\/","title":{"rendered":"A layman&#8217;s dictionary: What is APT and why is it called that?"},"content":{"rendered":"<p>APT: These three letters appear in cybersecurity-related news and bulletins more and more. Advanced Persistent Threats have become common.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>What is Advanced Persistent Threat? The term actually refers to two different things. Initially, it was hacking groups (possibly government-backed) involved in continuous and persistent (hence the name) attacks towards a specific victim. One example the notorious Comment Crew (aka APT 1), was involved with attacks on the largest media outlets in US.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>A Layman\u2019s dictionary: What is #APT and why is it called that #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fw6PA&amp;text=A+Layman%26%238217%3Bs+dictionary%3A+What+is+%23APT+and+why+is+it+called+that+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Now APT also refers to a specific kind of malicious cyber campaign that involves a series of diverse activities with the intent to cause harm or steal important and sensitive information. The groups behind such attacks are now called \u201cAPT groups\u201d.<\/p>\n<p>In 2013, Kaspersky Lab\u2019s Global Research &amp; Analysis Team (GReAT) reported that <a href=\"https:\/\/business.kaspersky.com\/blocking-nettraveler-our-answer-to-sophisticated-cyber-espionage\/850\" target=\"_blank\" rel=\"noopener nofollow\">NetTraveler<\/a>, a long-running APT campaign, had infected over 350 victims in more than 40 countries. At the time of the announcement, NetTraveler had been active for 9 years, and it was mainly stealing valuable data from space research laboratories, nanotechnology and energy production companies, nuclear power plants, medical equipment producers, and laser and communications technology companies. It also targeted Tibetan\/Uyghur activists, which suggests that it is most likely backed by Chinese authorities.<\/p>\n<p>However \u201chi-tech\u201d the targets were, methods used by NetTraveler \u2013 mainly phishing messages with attached MS Office documents, which when opened used exploits for old vulnerabilities CVE-2012-0158 and CVE-2010-3333 \u2013 were quite primitive, but surprisingly efficient.<\/p>\n<p>This year NetTraveler hit 10 years and was <a href=\"https:\/\/securelist.com\/blog\/research\/66272\/nettraveler-apt-gets-a-makeover-for-10th-birthday\/\" target=\"_blank\" rel=\"noopener\">updated with newer malware tools<\/a>. Still, it\u2019s the same APT campaign with the same people behind it.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020141\/wide-5-1.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2713\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020141\/wide-5-1.jpg\" alt=\"wide-5\" width=\"1000\" height=\"667\"><\/a><\/p>\n<p>Earlier this year security researchers uncovered yet another long-standing APT campaign aimed at the exfiltration of important data from organizations associated with strategic industrial sectors. This campaign received not just one name, but two: <a href=\"https:\/\/business.kaspersky.com\/crouching-yeti-got-caught-anyway\/2309\" target=\"_blank\" rel=\"noopener nofollow\">Energetic Bear and\/or Crouching Yeti<\/a>. It mainly targeted industrial and machinery sectors, but manufacturing, pharmaceutical, and construction companies were also attacked, along with education facilities and, of course, organizations related to information technology.<\/p>\n<p>Victims were either peppered with spearphishing PDF docs with embedded flash exploit (CVE-2011-0611, quite old, as one may see), or served with Trojanized software installers; then there were waterhole attacks using a variety of re-used exploits.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>APT actors don\u2019t need supercustom #malware for their campaigns to be successful<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fw6PA&amp;text=APT+actors+don%26%238217%3Bt+need+supercustom+%23malware+for+their+campaigns+to+be+successful\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Interestingly, none of these exploits were zero-day: All were long known with patches that were available, but not installed by victims. The campaign had been ongoing for at least four years prior to the discovery.<\/p>\n<p>As seen above, the APT campaigns have the following common features:<\/p>\n<ul>\n<li>Specific targets. Actors behind these campaigns are routinely interested in some specific data and\/or intelligence on the activities of the targeted entities.<\/li>\n<li>A diverse malicious toolset. The primary goal is to infiltrate the targeted entity infrastructure by any means necessary, not just spread around some malware and see what it would yield. So they use various tools such as Trojans, backdoors, exploits, etc., and while exploits may be old and well known, attackers often use sophisticated, multistage methods of infections. For instance, a phishing mail drops a Trojan, which checks whether the infected PC matches specific criteria, then \u201ccalls his friends\u201d and downloads other malware.<\/li>\n<li>Multistage approach. Aside from multistage infection, APT groups often choose not to hit immediately at the points where they are expected. For instance, they won\u2019t attack a CEO of a large transnational pharmaceutical corporation, because he most likely has the most bulletproof workstation around. Instead they may choose to target some low-level employee who\u2019s on the same network as the CEO, then use his PC and mobile devices <a href=\"https:\/\/www.kaspersky.com\/blog\/apt\/\" target=\"_blank\" rel=\"noopener nofollow\">as a stepping stone towards infecting more valuable machines<\/a>.<\/li>\n<li>Persistence. Attackers strive for a long-term presence and continuous exfiltration of the data they are interested in. Sometimes actors behind APT campaigns even pull the plug once exposed, as with Miniduke. <a href=\"https:\/\/business.kaspersky.com\/miniduke-is-back\/2189\" target=\"_blank\" rel=\"noopener nofollow\">However, after a year in a dormant state, it\u2019s back now, heavily upgraded, but still detectable<\/a>.<\/li>\n<\/ul>\n<p>It\u2019s easy to imagine the consequences for businesses affected by APT-style attacks: continuous loss of intellectual property, disruption of supply chains and operations, etc.<\/p>\n<p>Here are some recommendations:<\/p>\n<ul>\n<li>APT groups use mostly known exploits, so if there is a chance of becoming a target, it is necessary to keep track of the commonly used and most vulnerable software products, such as Adobe Acrobat, Adobe Flash, Oracle Java, Microsoft Office, etc. These software packages are almost ubiquitous and problematic. Keeping them up-to-date heavily mitigates the risks.<\/li>\n<li>Phishing emails\/messages is the most commonly used tool. Experienced users are capable of identifying this kind of threat, but most people would likely require specific training in order to detect this threat. Antiphishing software tools are also extremely helpful.<\/li>\n<li>Automatic exploit prevention technology will help where the zero-day (i.e. yet unknown) exploits are used. Kaspersky Lab\u2019s \u0410\u0415\u0420 can also prevent the escalation of malicious behavior even after the exploit has launched. This technology is based on the analysis of exploit behavior, as well as information on applications most often attacked by cybercriminals: Adobe Acrobat, Java, Windows components, Internet Explorer, and others. Any time these programs attempt to launch suspicious code, special controls immediately intervene, interrupt the launch and trigger a scan of the system.<\/li>\n<li>It is also necessary to limit access to sensitive data. Only authorized personnel should be able to access certain information, according to their roles and the business processes they are involved with. Other personnel should not have access to that data, and thus attackers won\u2019t be able to get to it just by compromising some \u201cobscure\u201d employee PC.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>APT is a term often mentioned in cybersecurity bulletins. Here&#8217;s what you need to know to understand it. <\/p>\n","protected":false},"author":209,"featured_media":15919,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2200,499,282],"class_list":{"0":"post-2711","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-advanced-persistent-threats","10":"tag-apt","11":"tag-cybersecurity"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/a-laymans-dictionary-what-is-apt-and-why-is-it-called-that\/2711\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/a-laymans-dictionary-what-is-apt-and-why-is-it-called-that\/2711\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/a-laymans-dictionary-what-is-apt-and-why-is-it-called-that\/2711\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/advanced-persistent-threats\/","name":"Advanced Persistent Threats"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2711"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2711\/revisions"}],"predecessor-version":[{"id":33349,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2711\/revisions\/33349"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15919"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}