Vega newsletter is published monthly by Vega BI, and
distributed to our partners to facilitate pursuit of a common interest in
top-notch technologies.
Once rare and sophisticated, the APT is now
becoming a common attack.
Is your organization ready? Any organization linked
to the Internet is at risk. To protect your organization against APTs, it’s
important to know what an APT is.
Typically, the intention of an APT attack is to steal data rather than to cause damage to the network or to the organization. APT attacks target organizations in sectors with high-value information, such as national defense, manufacturing and the financial industry. In an APT attack, the goal is to achieve ongoing access, therefor it is characterized as a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period. In order to maintain access without discovery, the intruder must imitate a normal user’s behavior and thus continuously rewrite code and employ sophisticated evasion techniques. Advanced Persistent Threat (APT) actors follow a staged approach, as articulated in the “APT-life Cycle” diagram , to target, penetrate and exploit the organization.