当前位置:网站首页>Apt attack
Apt attack
2022-06-23 22:11:00 【Evan Technology】
APT(Advanced Persistent Threat) High level persistent threat , The essence is targeted attack . Using advanced attack means to carry out long-term sustained network attack on specific targets ,APT The principle of attack is more advanced and advanced than other forms of attack , Its advanced nature is mainly reflected in APT Before launching an attack, it is necessary to accurately collect the business process and target system of the target . In the process of collecting , This attack will actively exploit the vulnerability of the trusted system and application of the attacked object , Use these vulnerabilities to build the network needed by the attacker , And make use of 0day Vulnerability to attack .
APT There are many ways to invade customers , It mainly includes the following aspects .
With smart phones 、 Tablets and USB And other mobile devices as the target and attack object, and then invade the enterprise information system . The malicious email of social engineering is a lot of APT One of the key factors for a successful attack , As social engineering attacks become more sophisticated , It's almost impossible to tell the true from the false . From some of the APT Large businesses that attack can find , The key factor for these enterprises to be threatened is that ordinary employees encounter malicious e-mail from social engineering . Hackers just started , Sending phishing emails to specific employees , As a way to use APT The source of the attack . Exploit firewall 、 Server and other system vulnerabilities, and then access to the enterprise network valid credential information is to use APT Another important means of attack .
All in all , High level persistent threat (APT) By all means , Bypassing traditional code based security solutions ( Such as antivirus software 、 A firewall 、IPS etc. ), And lurking in the system for longer , Make it hard for traditional defense systems to detect .
" Latent and persistent " yes APT The biggest threat to attack , Its main features include the following .
Latency : These new attacks and threats may exist in the user environment for more than a year or more , They keep gathering all kinds of information , Until important information is gathered . And these engines APT The purpose of hackers is not to gain profits in a short time , But the " Controlled host " As a springboard , Keep searching , Until you can completely grasp the target person 、 things 、 matter , So this kind of APT Attack mode , In essence, it's a kind of " The threat of malicious business spies ".
Continuity : because APT The attack is characterized by persistence or even as long as several years , This makes the managers of the enterprise imperceptible . in the meantime , such " Continuity " It is reflected in the various attack means that the attacker constantly tries , And long-term dormancy after penetrating into the network .
Targeting specific targets : For a particular government or enterprise , Long term planning 、 Organized intelligence theft , Send malicious social engineering emails to the locked objects , Such as a letter pretending to be a customer , Get the first chance to plant malware on your computer .
Install remote control tools : The attacker set up a botnet Botnet The architecture of remote control , Attackers regularly send copies of potentially valuable files to command and control servers (C&C Server) review . Filter sensitive Secrets data , It's transmitted by means of encryption .
边栏推荐
- Simple code and design concept of "back to top"
- [js] 生成随机数组
- How to build an API gateway and how to maintain an API gateway?
- How API gateway finds the role of microserver gateway in microservices
- Interpretation of opentelemetry project
- How to select Poe, poe+, and poe++ switches? One article will show you!
- Cloud native practice of meituan cluster scheduling system
- TMUX support, file transfer tool Trz / Tsz (trzsz) similar to RZ / SZ
- Freiburg University, Hildesheim University and other universities in Germany jointly | zero shot automl with pre trained models (zero sample automl based on pre training model)
- What is stock online account opening? Is it safe to open a mobile account?
猜你喜欢

Intel openvino tool suite advanced course & experiment operation record and learning summary

Analysis of Alibaba cloud Tianchi competition -- prediction of o2o coupon

北大、加州伯克利大学等联合| Domain-Adaptive Text Classification with Structured Knowledge from Unlabeled Data(基于未标记数据的结构化知识的领域自适应文本分类)

Code implementation of CAD drawing online web measurement tool (measuring distance, area, angle, etc.)

万字长文!一文搞懂InheritedWidget 局部刷新机制

CAD图在线Web测量工具代码实现(测量距离、面积、角度等)

ACL2022 | MVR:面向开放域检索的多视角文档表征

MySQL de duplication query only keeps one latest record

《阿里云天池大赛赛题解析》——O2O优惠卷预测

使用 Provider 改造屎一样的代码,代码量降低了2/3!
随机推荐
Digital transformation solution for supply chain platform of mechanical equipment industry
Lighthouse open source application practice: snipe it
How ppt creates a visual chart
How do API gateways set up dynamic routing? What are the benefits of dynamic routing?
[js] 生成随机数组
ICML2022 | 基于对比学习的离线元强化学习的鲁棒任务表示
What do you know about the 15 entry-level applets
What is stock online account opening? Is it safe to open a mobile account?
北大、加州伯克利大學等聯合| Domain-Adaptive Text Classification with Structured Knowledge from Unlabeled Data(基於未標記數據的結構化知識的領域自適應文本分類)
微信小程序中发送网络请求
What is the gold content of PMP certificate
The latest research progress of domain generalization from CVPR 2022
How to select Poe, poe+, and poe++ switches? One article will show you!
Practice of business level disaster recovery switching drill
The most common usage scenarios for redis
[tutorial] build librephotos using Tencent cloud lightweight application server to support photo management of face recognition!
北大、加州伯克利大学等联合| Domain-Adaptive Text Classification with Structured Knowledge from Unlabeled Data(基于未标记数据的结构化知识的领域自适应文本分类)
Completely open source and permanently free, this markdown editor is really fragrant!
Nanny level anti crawling teaching, JS reverse implementation of font anti crawling
TDD development mode recommendation process