Five Advanced Persistent Threats APT You MUST Know About

Global Events / Cybersecurity Books

Kevin Henry, CISSP-ISSEP, CISA, CISM, CBCI, CRISC, CSWAE is an expert in Programming, Systems Analysis and Information Technology Audit and will share the latest Advanced Persistent Threats (APT’s) and information on security systems. Kevin co-chairs the CBK for the CISSP and several other InfoSec Certifications. Kevin is also an authorized Instructor for (ISC)2, ISACA, and BCI.

Information security breaches are becoming ever more inevitable. It is beginning to feel that every website, every organization is now under attack and not always necessarily from persistent hackers, rather, from automated attacks.

According to the “2011 Data Breach Investigations Report” from Verizon, for example, the number of attacks launched online against businesses between 2005 and 2010 increased by a factor of five.

Intrusion detection is key, as is the ability to maintain the right information security technologies and practices in place to quickly detect when data has been breached. Advanced Persistent Threats lead into the concept of maintaining rigorous data protection policies. Being able to block known attacks and ideally identify how the breach occurred and what might have been stolen.

Cyber/ industrial hacking is rising. Attacks like Shady RAT and Operation Night Dragon exploited multiple energy companies and it’s not always China or the “big bad Russia” doing the hacking!

Other predicted APT’s in 2012 are the increase of mobile malware – we have an excellent presentation given by Georgia Weidmanhere where she outlines her very excellent Smartphone Penetration Testing Framework. Another constant IT security threat for businesses is spear-phishing. Spear-phising continues unabated. Most if not all information security professionals would agree that although there is no foolproof strategy, IT Security training and education will always be advantageous as a means of defense.

Social engineering attacks are also very worthy of mentioning within an advanced security threat context.

What do you think? Do you agree with Kevin? Have you experienced a rise in a particular type of APT this year? we’d love to hear your comments!