Advanced Persistent Threats (APT) are computer attacks usually driven by government agencies or terrorist organizations conducting espionage or trying to take valuable data for non financial purposes. Rarely are APTs led by political or commercial organizations. However, in some cases, marginal threats do arise from obsessed individuals and legitimate commercial organizations since the value of data goes well beyond just the financial value. Incidents like Project Aurora and Wikileaks highlights that data also has both political and military value.

Detailed Description

The key characteristics of APT hacking are:

Examples:

  1. Stuxnet-Worm targeting Iranian nuclear reactor machinery.
  2. Google hacked by Chinese government to uncover communications and identity of Chinese dissidents.

Prevention

If you have identified an APT, then you need to collect and review audit information with regards to accessing sensitive assets. Always, you should protect both your site and customers by using a rapid procedure of scanning for security vulnerabilities. Considering, however, the more “James Bond” nature of APTs, you may also need a powerful, fully customizable solution that integrates with vulnerability assessment technologies. For product information, click here.