Preventing an APT attack _ Pluralsight
Preventing an APT attack _ Pluralsight
BLOG ARTICLES
(/resource-center)
An advanced persistent threat (APT) attack gets into your computing environment and
sticks around for a while to do its damage. Once in, the remote attacker manipulates the
threat code to probe and then compromise the environment—for example, leaking
sensitive data or stealing intellectual property.
Installing antivirus software is not sufficient protection against APT attacks. Countering
this type of threat requires a combination of processes and tools. Here’s the lowdown:
In this context, “persistence” has two meanings. First, the attacker is very persistent
about compromising the target. They will try any which way to get in. Second, the
attacker will persistently explore to see if they can compromise even more. It’s this
second aspect that sets APT apart from other types of cyber attacks.
You might recall the high-profile Target data breach by RAM scraper attack
(https://threatpost.com/ram-scraper-malware-a-threat-to-point-of-sale-
systems/103623/) nearly a decade ago. A bad actor gained access to Target’s
Skip to content
environment via a compromised vendor. Next, the threat probed and found its ways into
(/)
Target’s point-of-sale (POS) devices (“advanced”). It stuck around for about three weeks
(“persistent”), stealing information on 40 million credit cards.
Infiltration
Preventing the initial infiltration requires strong access control. In Target's case, the
attacker impersonated a valid vendor by stealing its login credentials to Target's vendor
portal. Though practices like multi-factor authentication help reduce this type of risk,
there are myriad ways an attacker can gain an initial foothold. So, it’s vital to take
inventory of network, application, and endpoint security. Where do you have
vulnerabilities? Where are you exposed?
Also, companies need to be vigilant about monitoring any network traffic coming into
their environment via the firewall and IDS. Since this remote access can be initiated
inside the company using compromised endpoints and malware, it’s vital to monitor both
inbound and outbound connections.
Skip to content
Exfiltration (/)
Finally, APT usually culminates in doing damage such as stealing confidential data or
intellectual property. To mitigate the risk of a data breach, one must know what and
where the sensitive data and proprietary assets are. Once you know what to protect, use
tools such as DLP (data loss prevention) and endpoint security to prevent the
exfiltration.
Most important, since a threat may already be inside, companies need to implement a
Zero Trust (https://www.pluralsight.com/blog/security-professional/zero-trust-
strategy-what-is-zero-trust-architecture) mindset. Don’t trust users, servers, and
applications just because they are “inside” the organization’s network. You need to
perform access control to identify the requestor, no matter where they are.
Implementing a Zero Trust strategy and mitigating risks of APT attacks require full
support from CIOs and business leaders, as well as money, people, and time.
2. File Integrity Monitoring (FIN) to detect access and tampering related to critical files
1. Data Loss Prevention (DLP) with Endpoint Security to keep sensitive data from
exiting from the network or end-user devices
2. Strong data encryption to reduce the usefulness of data even if they are stolen
Skip to content
3. Data Rights Management (DRM) solutions to control access, usage, and track data
(/)
once it is "distributed" to the attacker
Second, now that you know what you lost, you need to stop the leak. You do that by
isolating the system and user accounts that may be causing the leak, as well as placing
stringent rules for your DLP and EDR. Vigilantly monitor that no leaks are happening.
Next, you can start the forensic work to figure out all the components and changes that
the APT may have put into place inside your environment unbeknownst to you. In
Target's case, the bad actor reportedly installed malware into the POS systems, created
file shares, and put scripts that periodically exfiltrated the data to the Internet.
Depending upon how extensive the APT activities are, the forensic effort may be huge.
Once you are sure that your system is back working normally, put security controls in
place to prevent an APT attack from happening again.
Skip to content
(/) INCIDENT RESPONDER
(HTTPS://APP.PLURALSIGHT.COM/CHANNELS/DETAILS/EE0CFA02-9EAD-4A09-
B2A6-16EF5231BF6D)
Terumi is an IT security consultant whose firm serves global companies and defense-
related organizations in the U.S. and Japan. Her expertise includes cloud security,
application security, ethical hacking, and certifications (CISSP, CCSP, CEH, and more). A
gifted teacher, she also delivers instructor-led training for Pluralsight in IT security
technologies.
RECOMMENDED ARTICLES
Support Community
Contact (/contact) Guides (https://www.pluralsight.com/guides)
Help Center Teach (/teach)
(https://help.pluralsight.com/help) Partner with Pluralsight (/partners)
IP Allowlist Affiliate Partners (/affiliate)
(https://help.pluralsight.com/help/ip-allowlist) Pluralsight One (https://www.pluralsightone.org/)
Site Map Authors (/authors)
(https://www.pluralsight.com/sitemap.xml)
Download Pluralsight (/product/downloads)
Skills Plans (/pricing/skills)
A Cloud Guru Plans (/cloud-guru/pricing)
Flow Plans (/pricing/flow)
Company Industries
About Us (/about) Education (/industries/public-sector/higher-
Careers (/careers) education)
Newsroom (/newsroom) Financial Services (FSBI) (/industries/finance)
Resources (/content/ps/en/resources) Healthcare (/industries/healthcare)
Insurance (/industries/insurance)
Non-Profit (https://www.pluralsightone.org/)
Public Sector (/industries/public-sector)
Newsletter
Sign up with your email to join our mailing list.
Skip to content
Email Address:*
(/)
Submit
"