Posts Tagged ‘APT-attacks’

FortinetAmong the key risks – sophisticated targeted attacks on mobile devices and applications, active use of malicious IPv6 shelters and exploits.

1. The purpose of APT attacks will be mobile users

APT attacks, the so-called sophisticated targeted threats (Advanced Persistent Threats), named No. 1 threat because of their ability to use a variety of techniques and the latest technology for simultaneous attack from all sides. All these actions are clearly aimed at achieving a specific goal – to gain access to confidential information. A few recent examples of victims: Stuxnet, Flame and Gauss. Analysts expect that in 2013, the main purpose of APT attacks will shift to the private individuals, executives, politicians, and public figures. Confirm this forecast will be extremely difficult, in part because, after hackers managed to gain access to desired data, they can easily remove malware from the target device before the victim realizes what has happened. Moreover, it is hardly a person who have been victims of such attacks, will report the incident to the media, as it is in the first place will affect their personal reputation, and not on the company, public or government organization. In turn, attackers will actively seek out the information that they could use for criminal purposes, such as blackmail or industrial espionage in order to obtain compensation. (more…)


Spear fishing

The company Trend Micro, presents the results of a new study of targeted attacks, the material for which was collected in the period from February to September of this year. According to the results, 91% of targeted attacks begin with sending messages ‘Spear fishing’.

These results confirm our earlier conclusion that targeted attacks often begin with ‘stuff’, such as e-mail messages designed to persuade the recipient to open a malicious file as an attachment or click on a link leading to a site with malware or exploits.

Spear fishing – a new type of phishing attack, a distinctive feature – the use of malicious information on the alleged victim to make the message more ‘individual’ and better disguise their intentions. For example, these may contain a reference to the addressee by name, position and title instead of the standard ‘de-identified’ titles like “Good day,” or “Dear Sirs.” (more…)