www.pluralsight.com
Open in
urlscan Pro
2606:4700::6813:a17f
Public Scan
Submitted URL: http://track.pluralsight.com/MzA2LURVUC03NDUAAAGAhS51iEk_zeh6gvgfkF50luhUP5L5WIPxA8YauTLnkm6tfAgtHvj-09GmFl-_DYrNy7_IBTA=
Effective URL: https://www.pluralsight.com/blog/security-professional/advanced-persistent-threat-attacks?mkt_tok=MzA2LURVUC03NDUAAAGAhS51iK...
Submission: On November 08 via api from SG — Scanned from DE
Effective URL: https://www.pluralsight.com/blog/security-professional/advanced-persistent-threat-attacks?mkt_tok=MzA2LURVUC03NDUAAAGAhS51iK...
Submission: On November 08 via api from SG — Scanned from DE
Form analysis
1 forms found in the DOM<form id="header_searchForm" class="header_search--form">
<input type="text" name="q" class="header_search--input" placeholder="What do you want to learn?" autocomplete="off" tabindex="2">
</form>
Text Content
___ * Platform Ways to upskill * Courses * Skill assessments * LabsNEW * Hands-on learning * Certification prep * Team efficiency Skills for * Software development * IT ops * Info & cyber security * Cloud computing * Machine learning / AI * Data professional * See our entire course library Top Trending Paths Path Microsoft Azure Deployment * 4 Courses * 7 Hours * Skill IQ available Get your Skill IQ Path AWS Operations * 7 Courses * 14 Hours * Skill IQ available Get your Skill IQ Path Cleaning Data with R * 5 Courses * 8 Hours * Skill IQ available Get your Skill IQ Path Core Python * 23 Courses * 41 Hours * Skill IQ available Get your Skill IQ Path Ruby Language Fundamentals * 7 Courses * 13 Hours * Skill IQ available Get your Skill IQ * Check out the Technology Index * See our entire course library * Check out the Technology Index * Products Build tech skills to drive results -------------------------------------------------------------------------------- * What is Skills? * View plans Get insights into your workflow -------------------------------------------------------------------------------- * What is Flow? * View plans * Resources Learn * Blog * Customer stories * Resource center * Guides * App download * Support Connect * Events * Webinars * Podcast THE ULTIMATE PLAYBOOK ON TECHNOLOGY SKILL DEVELOPMENT IMPLEMENT THE STRATEGY FOR BUILDING BETTER TEAMS LEARN MORE * For IndividuaIs * * Sign in Sign in with Skills Sign in Sign in with Flow Sign in * Skill up for free × It looks like you may be using a web browser that we don’t support. For an optimal website experience, try using one of the supported browsers. Chrome, Edge, Firefox or Safari. Blog > Technology > Security Professional Article ADVANCED PERSISTENT THREAT ATTACKS OCTOBER 21, 2021 Since 2003, October has served as Cyber Security Awareness month. The designation was a collaborative effort between the U.S. Department of Homeland Security and the National Cyber Security Alliance to ensure the safety of individuals online. The designation was born from the realization that increasing numbers of Internet users meant an increasing number of cyber threats. In honor of the designation, we wanted to bring awareness to one particular threat that could be detrimental to your organization: Advanced Persistent Threat (APT) attacks. CIOs, business leaders and learners need to be aware of what APT attacks are and how APT attacks work. First, let’s look at what APT attacks are. What are Advanced Persistent Threat attacks? APT is a type of threat, like malware, that first gets into one's environment by some means and sticks around for a while to do its damage (i.e. Persistent). Once in, the remote attacker manipulates the threat code to probe and then to compromise the environment, such as leaking sensitive data (i.e. Advanced). Installing antivirus software is not sufficient protection against APT attacks. Countering the threat of APT attacks requires a combination of processes and tools. How do APT attacks work? APT’s hallmark feature is its persistence and stealth once inside. Since there isn't one pattern to the APT, I'll give one example—the Target Data Breach by RAM Scraper attack. This incident is a bit dated, but it does have all the components of the APT attack. The attacker stole about 40 million credit card data from their Point-of-Sale (POS) devices over a 3-week period in that attack. This was an APT attack, because once the attacker gained access to Target's environment via a compromised vendor, the threat probed and then found its way to the POS systems—the "Advanced" part. It reportedly stuck around for about three weeks (Persistent) to steal credit card data via a malware dubbed the “RAM scraper”. In most cases, such as with the Target example, there are three main stages to the attack: 1. Infiltration, 2. Prolonged stealthy activity, 3. Exfiltration. It’s also important to remember that these attacks can be stopped at any one of these stages. Infiltration Stage Preventing the initial infiltration requires strong access control. In Target's case, the attacker impersonated a valid vendor by stealing its login credentials to Target's vendor portal. Perhaps, multi-factor authentication could have mitigated this. But there are myriad ways an attacker can get an initial foothold. So, organizations need to implement best practices around their network, application and endpoint security. Prolonged stealthy activity Stage Once in, APT will usually conduct stealthy activity inside the environment such as probing, installing malware, etc. Organizations need processes and tools for detecting and stopping abnormal activities and behaviors. Detecting anomalies starts from knowing the "normal" or baseline activities. Once you have the baseline, then use tools such as IDS (Intrusion Detection System), DAM (Database Activity Monitoring), File Integrity Monitoring (FIM), and Security Information and Event Management (SIEM) solutions to detect and respond to the threat. Also, in the "Advanced" part of APT, the attacker will remotely access the target's environment. So, companies should be vigilant in monitoring any network traffic coming into their environment via the firewall and IDS. However, this remote access may be initiated inside the company using compromised endpoints and malware, so monitoring connections both inbound and outbound is necessary. Exfiltration Stage Finally, APT usually culminates in doing damage such as stealing confidential or sensitive data. To mitigate the risk of a data breach, one must know what and where the data is. Once you know what to protect, use tools such as DLP (Data Loss Prevention) and Endpoint Security to prevent the exfiltration. Mitigating risks from APT requires first understanding your environment (i.e. baseline) to detect and respond to anomalies. That takes planning (e.g. identifying sensitive data, isolating resources, collecting baselines, etc.), training (e.g. incident response exercises) and continuous monitoring. It also calls for applying security best practices (e.g., defense in depth, separation of duties, least privilege, etc.) Mitigating risks from APT attacks also takes investment in money, people and time. Best practices organizations should consider for prevention If the threat cannot infiltrate the target environment, then APT can be stopped right at the onset. Examples of security control tools and best practices would be: 1. Network and host hardening to reduce exposure of resources to the threat 2. Vulnerability management to reduce security weaknesses to those services that are exposed 3. Network and application-level firewalls to stop unwanted traffic from coming in 4. Strong access control to prevent impersonation and spoofing 5. Endpoint security to prevent compromised end-user devices from becoming the entry point for the attacker If the threat does infiltrate the target, then one must be able to detect the APT activity. APT will strive to be stealthy, but in the end, the goal is to compromise security. Detecting and responding to this stealthy but anomalous behavior is the key to prevention. Examples of security control tools and best practices would be: 1. Network and host-based intrusion prevention system to detect anomalous behavior 2. File Integrity Monitoring (FIN) to detect access and tampering related to critical files 3. Database Activity Monitoring (DAM) to detect unusual database queries and activities 4. Security Information and Event Management (SIEM) to collect, correlate, and analyze logs in near realtime to detect trends that goes off from baseline 5. Endpoint Detection and Response (EDR) to detect and respond to malicious activities from the endpoint Finally, if the mitigation efforts failed to stop the APT from entering and snooping inside the environment, you want to reduce the risk of damage. A threat, in general, seeks to compromise the confidentiality, integrity and availability (CIA) of your systems. Prominent examples of APT have stolen sensitive data (e.g. Target Data Breach, Panama Papers Data Breach) and tampered with systems and data (e.g., Stuxnet). Examples of security control tools and best practices, in this case, would be: 1. Data Loss Prevention (DLP) with Endpoint Security to prevent sensitive data from exiting from the network or end-user devices 2. Strong data encryption to reduce the usefulness of data even if they are stolen 3. Data Rights Management (DRM) solutions to control access, usage and track data once it is "distributed" to the attacker If an organization is already suffering from an APT attack, then it must eradicate the threat from its environment. So, let's look at how to combat something like the Target data breach. How to combat an APT attack First, you discover to your horror that millions of data have been breached. That'll kickstart the response. Second, now that you know what you lost, you need to stop the leak. You do that by isolating the system that may be causing the leak, as well as placing stringent rules for your DLP and EDR. Vigilantly monitor that no leaks are happening. Now you can start the forensic work to figure out all the components and changes that the APT may have put into place inside your environment unbeknownst to you. In Target's case, it is reported that the APT installed malware into the POS systems, created file shares, put scripts that periodically exfiltrated the data to the Internet. Depending upon how extensive the APT activities were, the forensic effort may be huge. Once you are sure that your system is back working normally, put security controls in place to prevent this from happening again. Terumi Laskowsky, Cybersecurity Instructor DevelopIntelligence, a Pluralsight Company https://www.developintelligence.com/ In addition to teaching with DI, Terumi is an IT security consultant in Hawaii, working with global companies in the U.S. and Japan. Her expertise includes cloud security, application security and ethical hacking. Share -------------------------------------------------------------------------------- Recommended articles 5 KEYS TO SUCCESSFUL ORGANIZATIONAL DESIGN How do you create an organization that is nimble, flexible and takes a fresh view of team structure? These are the keys to creating and maintaining a successful business that will last the test of time. Read more WHY YOUR BEST TECH TALENT QUITS Your best developers and IT pros receive recruiting offers in their InMail and inboxes daily. Because the competition for the top tech talent is so fierce, how do you keep your best employees in house? Read more TECHNOLOGY IN 2025: PREPARE YOUR WORKFORCE The key to surviving this new industrial revolution is leading it. That requires two key elements of agile businesses: awareness of disruptive technology and a plan to develop talent that can make the most of it. Read more -------------------------------------------------------------------------------- Subscribe to the newsletter Back to blog › READY TO SKILL UP YOUR ENTIRE TEAM? 10 Subscriptions Need more subscriptions? Contact sales. Continue to checkout Continue to checkout Cancel WITH YOUR PLURALSIGHT PLAN, YOU CAN: WITH YOUR 14-DAY PILOT, YOU CAN: * Access thousands of videos to develop critical skills * Give up to 10 users access to thousands of video courses * Practice and apply skills with interactive courses and projects * See skills, usage, and trend data for your teams * Prepare for certifications with industry-leading practice exams * Measure proficiency across skills and roles * Align learning to your goals with paths and channels READY TO SKILL UP YOUR ENTIRE TEAM? 10 Subscriptions Need more subscriptions? Contact sales. Continue to checkout Cancel WITH YOUR PLURALSIGHT PLAN, YOU CAN: WITH YOUR 14-DAY PILOT, YOU CAN: * Access thousands of videos to develop critical skills * Give up to 10 users access to thousands of video courses * Practice and apply skills with interactive courses and projects * See skills, usage, and trend data for your teams * Prepare for certifications with industry-leading practice exams * Measure proficiency across skills and roles * Align learning to your goals with paths and channels ╲╱ Solutions Pluralsight Skills Pluralsight Flow Government Gift of Pluralsight View Pricing Contact Sales Skill up for free ╲╱ Platform Browse library Role IQ Skill IQ Iris Authors Professional Services Technology Index ╲╱ Company About us Customer stories Careers Blog Newsroom Resource center Guides ╲╱ Resources Download Pluralsight Events Teach Partners Affiliate program PluralsightOne.org Subscribe ╲╱ Support Contact Help center IP whitelist Sitemap Copyright © 2004 - 2021 Pluralsight LLC. All rights reserved Terms of Use Privacy Policy We use cookies to make interactions with our websites and services easy and meaningful. For more information about the cookies we use or to find out how you can disable cookies, click here. You have disabled non-critical cookies and are browsing in private mode. For the best possible experience on our website, please accept cookies. For additional details please read our privacy policy. Allow Decline × We Value Your Privacy Settings NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar technologies on this site and around the web to collect and use personal data (e.g., your IP address). If you consent, the cookies, device identifiers, or other information can be stored or accessed on your device for the purposes described below. You can click "Allow All" or "Decline All" or click Settings above to customize your consent. NextRoll and our advertising partners process personal data to: ● Store and/or access information on a device; ● Create a personalized content profile; ● Select personalised content; ● Personalized ads, ad measurement and audience insights; ● Product development. For some of the purposes above, our advertising partners: ● Use precise geolocation data. Some of our partners rely on their legitimate business interests to process personal data. View our advertising partners to see the purposes they believe they have a legitimate interest for and how you can object to such processing. Your changes on this site will be applied across the internet on any digital property you visit using NextRoll's technology. If you select Decline All, you will still be able to view content on this site and you will still receive advertising, but the advertising will not be tailored for you. You may change your setting whenever you see Decline All Allow All