Lepide Blog: A Guide to IT Security, Compliance and IT Operations

What is an Advanced Persistent Threat (APT) and How to Defend Against It

What is an Advanced Persistent Threat

With so many cybersecurity threats for you to watch out for, it can be difficult to keep up with all the acronyms, methods and protection techniques. With that in mind, we have created this quick guide to a commonly referred to method of cybersecurity attack; Advanced Persistent Threats (APTs).

What is an Advanced Persistent Threat (APT)?

An Advanced Persistent Threat is a method of cybersecurity attack in which unauthorized access to data or systems is obtained by an individual or a group for an extended period of time. The goal of APTs is to remain undetected for as long as possible whilst infiltrating/exfiltrating as much sensitive data as possible. The motive behind an APT could be anything from simple financial gain to state-sponsored political maneuvering. Due to the high degree of covertness required to pull off a successful APT attack, such threats are usually highly targeted, meticulously planned in advance and using sophistical techniques.

The Advanced Persistent Threat (APT) Lifecycle

An APT attack typically lasts for a much longer time period and is far more complex than other attack methods. The typical lifecycle is broken down into 12 steps, as shown in the infographic below. However, they can be summarized simply into the following five processes:

  1. The Planning Stage: The attacker picks which organization to target and what the objectives of the attack are going to be. They will decide what they are going after, what their objective is and a timeline. They will also pick the method of attack and research the target thoroughly.
  2. Getting In: The objective in this phase is to get an initial foothold in the target environment. This can be done through a variety of methods that will have been researched and decided upon in the first stage. Some common methods of entry are spear phishing or brute force attacks.
  3. Get to the Target Data: Once inside the target environment, the next stage is to maneuver to the valuable data. This may involve moving laterally across the network, expanding access and obtaining credentials along the way.
  4. Deploy Tools: In this stage, the attacker can deploy additional tools to help fulfil the initial objective and strengthen their foothold within the environment.
  5. Retreat and Cover Tracks: In this stage, it’s likely that the objective will be to exfiltrate the valuable data and remain inside the network so that future campaigns can take place. All of this is to be done whilst remaining completely undetected.

Common Advanced Persistent Threat Attack Methods

APT attacks usually start off with any one of the below methods to gain an initial foothold in the target environment:

How to Defend Against Advanced Persistent Threats (APTs)

The best way to defend against APTs is through constant vigilance and a comprehensive data security strategy that involves a sophisticated data security platform. There are four main steps you can take to help defend against Advanced Persistent Threats:

Lepide’s Data Security Platform allows you to perform all the necessary data discovery, permissions analysis and UEBA functionality required to begin your management of Advanced Persistent Threats (APTs). For more information, schedule a demo with one of our engineers today.