reports - Venafi

Next
reports
Rep or ts.InformationWeek.com
Advanced Persistent Threats:
The New Reality
For most organizations, the imminent danger that advanced persistent
threats pose has been relatively low. That’s changing as attackers’
target base widens, their knowledge grows and their cyber weapons
trickle down to the hacker masses. In this Dark Reading report, we
examine the current APT landscape and provide recommendations for
protecting your organization against this growing concern.
By Michael Cobb
Presented in conjunction with
Report ID: S6920513
May 2013 $99
Previous
Next
CONTENTS
reports
3
4
5
Author’s Bio
Executive Summary
Advanced Persistent Threats: Myth vs.
Reality
5 Figure 1: Hidden but Not Invisible
6 What Is an APT?
6 Figure 2: APT Technology
7 Who’s Behind APTs?
8 Figure 3: Profiling Threat Actors
9 An APT in Action
11 APT-as-a-Service
12 How to Fight Back
14 Related Reports
Advanced Persistent Threats: The New Reality
ABOUT US
InformationWeek Reports’ analysts arm business technology
decision-makers with real-world perspective based on qualitative
and quantitative research, business and technology assessment and
planning tools, and adoption best practices gleaned from
experience.
OUR STAFF
Lorna Garey, content director; [email protected]
Heather Vallis, managing editor, research; [email protected]
Elizabeth Chodak, copy chief; [email protected]
Tara DeFilippo, associate art director; [email protected]
Find all of our reports at reports.informationweek.com.
TABLE OF
reports.informationweek.com
May 2013 2
Previous
Next
Table of Contents
reports
Michael Cobb
InformationWeek Reports
Advanced Persistent Threats: The New Reality
Michael Cobb, CISSP-ISSAP, is a renowned security author with more than 15 years of
experience in the IT industry. He is the founder and managing director of Cobweb
Applications, a consultancy that provides data security services. He co-authored the
book IIS Security and has written numerous technical articles for leading IT publications. Michael is also a Microsoft Certified Database Administrator.
Want More?
Never Miss
a Report!
Follow
reports.informationweek.com
Follow
© 2013 InformationWeek, Reproduction Prohibited
May 2013 3
Previous
Next
Table of Contents
SUMMARY
reports
EXECUTIVE
reports.informationweek.com
Advanced Persistent Threats: The New Reality
There’s a lot we know about advanced persistent threats, but there’s a lot we don’t know.
This is due in large part to the complexity of the attacks and the stealth of the attackers.
Our knowledge about APTs is growing, but, unfortunately, that’s because the attacks
themselves are growing in frequency. Criminals using APTs want data, so the more valuable
an organization’s data, the more likely it is to be targeted. Government agencies and
organizations in industries such as finance, energy, IT, aerospace, and chemical and pharmaceuticals are the mostly likely to be the victims of APT infections, as are those involved in
international trade. Users and organizations with access through business relationships to
valuable data, such as smaller defense contractors, are also beginning to be targeted. And
the use of watering hole attacks may be heralding a change in tactic to mass infections,
which are then sifted for any potentially interesting targets. Criminals are less likely to target
organizations running critical infrastructure, but attempted APT-type attacks by hactivists
and nation-states are on the increase. Any organization running industrial control systems
linked to the Internet is at risk. Administrators of some systems may be unaware that their
systems are connected to the Internet, while systems installed some years ago, when cybersecurity was less of an issue, may not be adequately protected from attack.
To protect your organization against APTs, it’s important to know what an APT is — and
what it isn’t. In this Dark Reading report, we examine the history of the attacks in the context
of what’s happening today, analyze the ways in which the attacks are perpetrated, and
provide recommendations for knowing when such an attack is an imminent threat for your
organization.
May 2013 4
Previous
Next
Table of Contents
reports
Advanced Persistent Threats: The New Reality
Advanced Persistent Threats: Myth vs. Reality
The term advanced persistent threat, or
APT, was first used by the U.S. Air Force back
in 2006 to describe complex (advanced) cyber
attacks against specific targets over long periods of time (persistent). APTs first really hit
the headlines in 2010 when a worm called
Stuxnet was found to be infecting supervisory
control and data acquisition management
systems produced by Siemens. Subsequent
investigation revealed a cyber weapon
designed to shut down Iran’s nuclear program
by tampering with programmable logic controllers used in its nuclear fuel processing
plant. The sheer audacity and sophistication
of this attack created hysteria among security
professionals and network administrators, and
has led to a great deal of confusion about
what APTs are and what they can do.
Research into Stuxnet and the appearance of
Duqu and then Flame in 2012 have kept APTs
in the spotlight. Thanks to recent analysis such
as that found in information security firm Mandiant’s “APT1: Exposing One of China’s Cyber
Figure 1
Hidden But Not Invisible
Despite using several methods to cloak their APT operations, hackers’ activities can be analyzed and used to develop
better defenses. For example, based on when the Poison Ivy servers were active, it looks like attackers’ working hours
were between 2 a.m. and 10 a.m. UTC, plus one hour from Monday to Saturday.
Attacker’s Command & Control Infrastructure
Attacker controls RAT server
using VMWare remote desktop
Poison Ivy Server
Proxy Server
Attacker’s computer
Internet
orts
er p
v
o
0
es
icat or 346
n
u
m
80
Com 43, 80
4
,
80
Infected target network
Source: InformationWeek Reports
reports.informationweek.com
Port forwarding hides the real
IP address of the RAT server
S6920513/1
May 2013 5
Previous
Next
Table of Contents
reports
Espionage Units,” we now have a clearer idea
of the DNA of an APT. In this Dark Reading report, we reconsider the scope and potential of
APTs and offer some common-sense advice on
how your organization can combat this threat.
What Is an APT?
Though the term originally referred to
nation-states engaging in cyber espionage,
APT techniques are also being used by cybercriminals to steal data from businesses for
financial gain. What distinguishes an APT from
other threats is that it is targeted, persistent,
evasive and advanced.
>> Targeted: Unlike the majority of malware, which randomly infects any computer
vulnerable to a given exploit, APTs target specific organizations with the purpose of stealing specific data or causing specific damage.
The Conficker worm, for example, used many
advanced techniques but did not target a particular organization. It infected millions of
computers in more than 200 countries. In contrast, Stuxnet was designed to target a certain
type, a certain brand and a certain model of
reports.informationweek.com
Advanced Persistent Threats: The New Reality
control system. And the RSA SecurID attack
was developed specifically to obtain SecurID
information to be used in future APT attacks
against defense contractors, including Lockheed Martin. The Aurora attacks against
Google and Adobe targeted source code, and
Figure 2
APT Terminology
Security researchers and vendors use military terms and even invented words to describe malicious cyberactivity.
These definitions should help make things a little clearer.
Backdoor
Malware that allows remote administration of an infected system.
Compromised/Rogue
digital certificate
A digital certificate whose private key and certificate file have been illegitimately accessed and copied.
Cyber-something
Internet-related version of an existing activity or thing.
Drive-by download
Method of compromising computers by tricking the victim into unintentionally or unwittingly downloading
malware when visiting a website, viewing an email message or clicking on a pop-up window.
Exploit code
Code used to enter a target system by taking advantage of one of its vulnerabilities.
Payload
Once exploit code accesses a target system, the payload is executed (usually to install a backdoor).
Sandbox
A mechanism for executing untrusted code within a tightly controlled set of resources.
Trojan
Malware hidden in a program or file that appears useful, interesting or harmless.
Vulnerability
Typically a flaw in operating system or application software, but a vulnerability can also be a lack of protection,
a poor security practice or an incorrect system configuration.
Weaponized
document
Document or file containing malicious code.
Zero-day exploit
Exploits that take advantage of vulnerabilities for which there are no patches available from the software vendor.
Source: InformationWeek Reports
S6920513/2
May 2013 6
Previous
Next
Table of Contents
Trends in Mobile Device
Threats
While there’s some debate about
the level of threat mobile devices
pose, there’s no question that the
threat is growing. With readily
available information about the
devices in use, and often few
corporate safeguards in place,
mobile devices are turning out to
be a lucrative vector for attackers
looking for an in to enterprise
networks. In this Dark Reading
report, we explain how the threat
is growing, what attackers are
targeting and why you need to
be concerned.
Download
reports.informationweek.com
reports
the Sony attack targeted personally identifiable information.
These were not opportunistic attacks: They
were focused campaigns taking time, patience and money to achieve very specific objectives. With that said, some attacks are targeted but not APTs. Attacks by Anonymous
and LulzSec, for example, are always against a
specific organization, but they make little or
no effort to remain undetected, a key feature
of an APT.
>> Persistent: To achieve their objective,
those developing an APT must find vulnerabilities within a target’s infrastructure, evaluate
the security controls protecting it, determine
how to deliver the attack and exploit the vulnerability, compromise the target network,
gain access to privileged hosts, find the target
data and then extract it — all without being
detected. This requires enormous amounts of
research, and the entire process may take
months or even years. F-Secure Labs estimates
that it took more than 10 person-years of work
to develop Stuxnet. Related attacks like Duqu
and Flame might have taken even more.
Advanced Persistent Threats: The New Reality
>> Evasive: A key difference between most
malware and an APT is its ability to persist —
that is, to evade detection by network security
controls while still collecting and extracting
data. The ingenious methods used in the past
show the in-depth knowledge of the attack
developers.
In many cases, developers use unknown
zero-day exploits so there are no antivirus signatures available to provide protection. Members of the Elderwood gang, the hackers behind the Aurora attacks, have used eight
zero-day vulnerabilities during the last three
years. Flame managed to evade detection for
some five years while stealing all kinds of data
— even turning on victims’ computer microphones to record conversations. Data is hidden using custom encryption and within protocols that are allowed through firewall filters.
Surreptitious routes are used to contact command-and-control (C&C) servers for updates
and to extract information.
>> Advanced: APTs use a wide range of advanced methodologies to succeed with each
phase of an attack. Stuxnet included the first-
ever programmable logic controller rootkit.
Flame achieved what’s believed to be the
only in-the-wild cryptographic collision attack; it was used to hijack Microsoft’s Windows Update mechanism so it could spread
from machine to machine — a feat that requires the expertise of world-class cryptographers. It’s also suspected that some hackers
have managed to access source code for popular products from vendors such as Adobe
and Microsoft, making it easier to find zeroday vulnerabilities. Not all malware used in
APTs is so cutting-edge, but the way in which
the malware is used is often ingenious. Further, the planning and time spent on developing attacks shows just how well-resourced
and skilled the teams behind them are.
Who’s Behind APTs?
There’s always a lot of speculation and finger pointing once an APT attack is uncovered,
and those accused are usually the traditional
enemies of the victim. However, when it
comes to determining who is responsible for
a particular APT-style attack, there is usually
May 2013 7
Previous
Next
Table of Contents
reports
Advanced Persistent Threats: The New Reality
Figure 3
little irrefutable and unbiased evidence
available. What we do know is that APTs
require a level of skill so high that only
highly organized and well-funded cybercriminals and nation-states have the resources to carry them out.
The conclusions as to who is responsible for an APT attack are still mainly conjecture and supposition. For example, the
South Korean government can only surmise who was behind a cyber attack on
its banks and broadcasters. The government claims that investigators were able
to trace attacks that affected about
32,000 computers and disrupted some
Internet banking services and automated teller machines to an IP address in
North Korea. But IP addresses are always
spoofed in an attack.
Another example showing how difficult it is to identify those behind an
attack involves the work of the Winnti
group. This group has been running an
APT-style war against more than 30 online gaming companies around the
Profiling Threat Actors
According to the Verizon 2013 Data Breach Investigations Report, more than half of all external data breaches tie to
organized criminal groups.
Organized Crime
State-Affiliated
Activists
Victim Industry
Finance
Retail
Food
Manufacturing
Professional
Transportation
Information
Public
Other Services
Region of Operation
Eastern Europe
North America
East Asia (China)
Western Europe
North America
Common Actions
Tampering (Physical)
Brute force (Hacking)
Spyware (Malware)
Capture stored data (Malware)
Adminware (MAlware)
RAM Scraper (Malware)
Backdoor (Malware)
Phishing (Social)
Command/Control (C2) (Malware, Hacking)
Export data (Malware)
Password dumper (Malware)
Downloader (Malware)
Stolen creds (Hacking)
SQLi (hacking)
Stolen creds (Hacking)
Brute force (Hacking)
RFI (Hacking)
Backdoor (Malware)
Targeted Assets
ATM
POS controller
POS terminal
Database
Desktop
Laptop/desktop
File server
Mail server
Directory server
Web application
Database
Mail server
Desired Data
Payment cards
Credentials
Bank account info
Credentials
Internal organization data
Trade secrets
System info
Personal info
Credentials
Internal organization data
Source: Verizon 2013 Data Breach Investigations Report
reports.informationweek.com
S6920513/3
May 2013 8
Previous
Next
Table of Contents
Like This Report?
Rate It!
Something we could do
better? Let us know.
Rate
reports.informationweek.com
reports
world since 2009, although the attacks were
only discovered in 2011. By stealing digital
certificates signed by legitimate software vendors, the group has been able to sign malware
to use in attacks. It has then stolen source
code to find vulnerabilities that let the group
loot in-game currencies and sell them for real
money. Researchers say they have found examples of Chinese language in some of the
malware and that the attacks used IP addresses based in China. However, the certificates that were stolen have been used in attacks orchestrated by other hacking groups
against companies in the aerospace industry,
South Korea’s largest social network and political activists. No one knows if the Winnti
group sold or, because of political affiliations,
freely supplied the certificates used in these
attacks.
Stuxnet appeared in the Middle East, with
nearly half of the proven infections being in
Iran. It has been acknowledged as an American and Israeli state-sponsored creation.
Because of key connections between
Stuxnet and Flame, Russian security firm
Advanced Persistent Threats: The New Reality
Kaspersky Lab says there can be little doubt
that Flame is also an American and Israeli
weapon. Yet, in terms of actual attribution,
we still cannot be 100% sure. The culprit is
often identified because we don’t know who
else it could be.
The Mandiant APT1 report is probably the
closest anyone’s gotten to pinpointing where
some of these attacks originate. APT1 is one
of more than 20 APT groups with origins in
China. The group has conducted a cyber espionage campaign since at least 2006, and it’s
believed to have stolen hundreds of terabytes of data from at least 141 organizations
around the world. Mandiant tracked APT1
back to four large networks in Shanghai, two
of which serve the Pudong New Area. This is
the location of Unit 61398 of the People’s Liberation Army and is in precisely the same
area from which APT1 activity appears to
originate. Although a lot of the evidence is
very compelling, little can be confirmed as
concrete fact, with most of Mandiant’s findings prefaced with “believed to be,” “appears
to be” or “almost certainly.”
An APT in Action
The most common technique for introducing APT malware into a victim’s network is a
spear-phishing campaign using sophisticated
social engineering techniques. This is an easier and more successful approach than trying
to break through network perimeter defenses. Depending on how the communication is carried out — such as via email, IM or
social networking message — either a malicious file attachment or link to a malicious site
is included.
To increase the chances of the target clicking the malicious link or opening the attachment, attackers spend a lot of time researching the phishing target and the target
system. Information is mined from a variety
of sources, including corporate blogs; Google
searches; phone calls; social media sites; and
even the target’s friends, colleagues and followers. This research can tell attackers
enough about the target’s computing environment that specific operating systems and
application vulnerabilities on the target’s
computer can be exploited without detecMay 2013 9
Previous
Next
Table of Contents
reports
tion by any installed security systems.
Messages are often sent from webmail
accounts or from spoofed email addresses,
such as government email addresses. In addition, Microsoft Office documents, PDFs and
Hangul files — a word processing application
that supports the Korean language — are commonly used as booby-trapped attachments.
A method of infection that has emerged
more recently is the use of “watering holes.”
By injecting malicious code into a website
targets are likely to
visit, there is no need
A method of infection that has
for any direct contact
emerged more recently is the use
with the victim. It’s similar to a typical drive-by
of “watering holes.”
download attack, except the watering hole has been selected for
the audience it attracts. For example, hackers
compromised the nongovernmental organization Tibetan Homes Foundation website in
an ongoing campaign to monitor Tibetan
sympathizers. The attack installed a back door
signed with a Winnti stolen certificate delivered via a Flash exploit.
reports.informationweek.com
Advanced Persistent Threats: The New Reality
Indeed, more and more APT attacks use
stolen and compromised certificates. They can
be used to sign malware so that it appears legitimate and leveraged for man- in-themiddle attacks that are undetectable by end
users. Stuxnet, Duqu and Flame all used rogue
certificates to evade detection. However, they
were delivered not by email but by a USB
drive. This may seem rather low tech compared with other methods, but it’s very effective in the face of a highly isolated network
because it’s directed at the weakest link in the
security chain — human behavior. An infected
USB key doesn’t need to bypass network security controls, and it can pass through security doors, access secure areas and be plugged
into privileged or mission-critical machines by
engineers, maintenance workers and others
with physical access to the network. These
people may be acting either as collaborators
or unwitting accomplices.
Once attackers manage to infect their
victim’s machine, the process of installing a
back door and the full range of attack tools
and exploring the network begins. Flame
spread through a network by spoofing a
Windows Update server. If it infected a device
running Bluetooth, the device was turned into
a Bluetooth beacon so it could download data
from any nearby Bluetooth-enabled device. It
could also spread itself via Bluetooth, using
any devices with a wireless connection to the
Internet to bypass network firewalls and reach
its C&C servers — a route that bypassed any
security controls on the network.
While many attacks try to immediately gain
control of a victim’s system, recent APTs seem
to have operated far more stealthily. Research
by FireEye provides great insight into the sophistication of the latest methods being used.
For example, Trojan.APT.BaneChant leverages
multiple advanced evasion techniques to
achieve stealth and persistent infection. A
spear-phishing document is used to exploit a
known vulnerability and download an XORencoded binary.
This, however, is only stage one of the malicious payload. It incorporates mouse-click detection to evade sandbox analysis. Only if it
detects three or more left-mouse clicks — evMay 2013 10
Previous
Next
Table of Contents
Like This Report?
Share it!
Tweet
Like
Share
reports.informationweek.com
reports
idence of human interaction — will it attempt
to download the stage two payload and the
true malicious code. Using a legitimate URLshortening service to defeat automated URL
blacklisting, a fake JPEG file to defeat network
binary extraction is downloaded and executed directly in memory. It achieves persistency by creating a shortcut in the startup
folder pointing to a copy of itself masquerading as a legitimate Google Updater.
Analysis of compromised systems shows that
multiple tools are often used in parallel and
typically mutate to avoid detection. A popular
tool is the remote administration tool called
Poison Ivy, which has the following capabilities:
>> File management
>> File search
>> File transfer
>> Registry management
>> Process management
>> Services management
>> Remote shell
>> Screen shot creation
>> Hash stealing
>> Audio capture
Advanced Persistent Threats: The New Reality
Two Luxembourg-based security organizations — Malware.lu CERT and iTrust Consulting — studied how APTs covered in the Mandiant APT1 report use a Poison Ivy server
hidden behind a proxy server using port forwarding to hide the real IP of the attacker’s
computer (see Figure 1).
There’s no doubt that those developing
APTs are incredibly knowledgeable, but they
aren’t infallible. For example, Flame is certainly
cutting-edge malware, but its creators left
enough clues in the source code that
researchers were able to link Flame to the
developers of Stuxnet and Duqu. In another
example of APTs gone wrong, the Stuxnet
worm was supposed to work only within
Iran’s Natanz refining facility, yet somehow it
escaped the Natanz network and began
spreading: Stuxnet has been found to have infected more than 40,000 unique external IP
addresses from over 155 countries. And the
Winnti group didn’t intend to infect users of
the online game servers the group had attacked, yet some of the tools used turned up
on users’ machines. This error helped trigger
an investigation that led to the discovery of
the real campaign.
The sophistication and capabilities of some
APTs is truly intimidating, and concerns have
been raised about the threat of APTs to critical
infrastructures that support our economies,
such as power and water systems. It’s unlikely
these systems are suddenly going to fail because of an APT because terrorist groups lack
the required technical expertise to make this
happen. It isn’t just a case of switching off a
system via a cyber attack; the attack has to actually reprogram the system, and that’s extremely difficult. Countries such as China may
well have the ability to severely disrupt our
key infrastructure services, but there’s no
commercial or political benefit in destabilizing the world economy they are part of. Sabotage and espionage are quite different.
APT-as-a-Service
Hackers are adopting an increasingly commercial approach to the business of cybercrime. Like regular software, crimeware is
continually adding new features to attract
May 2013 11
Previous
Next
Table of Contents
reports
users. For example, a new SpyEye variant can
activate the victim’s webcam and capture the
video stream. Zeus, a popular banking Trojan
horse, became harder to take down with its
Gameover version, and the Citadel version
even introduced a customer ticketing system
for better service. Botnets have evolved from
single-purpose to multipurpose weapons,
built with a modular design that allows the
same collection of compromised machines to
execute different tasks without having to repeat the infection process.
A lot of time and money are being invested
in creating better malware and infection
methods, but the focus is still on quick results and returns. Hactivists want to make a
statement now; criminals want to make a
profit now.
While it’s unlikely that malware-as-a-service
will spread to APTs, what is troubling is that
the techniques being created for use in APTs
are filtering out into the wild. Those involved
in their development are selling exploits,
source code and stolen digital certificates,
which is resulting in APT knowledge and rereports.informationweek.com
Advanced Persistent Threats: The New Reality
sources turning up in malware kits. This
means that what was once high-level, rarified
knowledge is trickling down to the masses.
Extrapolating even further, this means that
APTs are now a clear and present danger for
an increasing number of organizations.
How to Fight Back
Rarely will a single event alert network security controls to an APT. Therefore, no silverbullet technologies will single handedly stop
and catch APT-type attacks. What is needed is
a multilayered approach to identify patterns
of events that are characteristic of APT behavior and methodologies. Any suspicious behavior can then be investigated, and remedial action taken, to stop an attack from spreading.
While perimeter defenses remain essential,
they can no longer operate in isolation. The
information they produce in the form of logs
and alerts needs to be pooled and aggregated with logs from desktops and servers to
provide better insight into activity within an
organization. This threat intelligence can be
enhanced by incorporating external feeds to
effectively combat threats at all layers and
identify behaviors not seen before, such as
zero-day attacks. One weakness that all information-stealing malware has is that it has to
send the data out of the network. Network
administrators should be looking at any suspicious egress traffic as a possible APT red
flag. Also, to maintain persistence, APTs will often make modifications to the file system and
registry, so integrity checks to monitor such
changes are essential.
Many security vendors are upgrading their
intelligence-driven security products to incorporate big data to aid in the discovery of malicious activity hidden deep in the masses of
an organization’s data. It’s hoped that this approach can deliver before-the-fact alerts, but
it’s not yet proven. Human surveillance and investigation will still be necessary to spot certain clues. For example, Kaspersky researchers
found the gaming servers infected by Winnti
activities because infected home computers
were connected by the fact that their owners
were all fans of the same online games.
Most APT attacks focus on the acquisition of
May 2013 12
Previous
Next
Table of Contents
reports
sensitive data, so controls that protect the
data itself — wherever it resides — are extremely important components of defense.
The vast majority of all data compromised involves servers, so those systems holding sensitive data need to be secured in well-protected and dedicated network segments.
Data must be encrypted while at rest and during transit across the network with strong authentication controlling who can access it and
from where.
It should go without saying that operating
system and application software must be
patched. The Red October malware infected
hundreds of computer networks in diplomatic, governmental and scientific research
organizations around the world using boobytrapped Microsoft Word and Excel documents
that exploited vulnerabilities Microsoft had already patched. Red October is one of the
most advanced espionage tools ever discovered, with more than 1,000 modules, but victims have made things easy for attackers by
leaving their systems unpatched.
Finally, awareness training about APTs is esreports.informationweek.com
Advanced Persistent Threats: The New Reality
sential. Nearly every known attack has required some human interaction to enable the
attacker to gain a foothold within the network. Increasing user knowledge and improving users’ security behavior is critical to stemming the tide of successful intrusions. The use
of mobile devices also needs to be brought in
line with acceptable-use policies applied to
laptops — securing any network requires
documented policies and procedures as a
foundation.
Our understanding of APTs is increasing all
the time. Threat intelligence from the global
security community — that is, what others
have already discovered or uncovered — can
be leveraged to improve detection of malicious activity within other networks. Industries need to share information on attempted
cyber attacks not just with government intelligence services but with their peers. APTs are
certainly no myth, and the reality is that our
defenses are still playing catch-up. This reinforces the maxim that security is a process,
not a one-off event or product.
May 2013 13
Previous
Table of Contents
MORE
reports
LIKE THIS
Newsletter
Want to stay current on all new
InformationWeek Reports?
Subscribe to our weekly
newsletter and never miss
a beat.
Advanced Persistent Threats: The New Reality
Want More Like This?
InformationWeek creates more than 150 reports like this each year, and they’re all free to registered
users. We’ll help you sort through vendor claims, justify IT projects and implement new systems by providing analysis and advice from IT professionals. Right now on our site you’ll find:
Heading Off Advanced Social Engineering Attacks: Social engineering attacks are getting increasingly
sophisticated, but there’s only so much the law and technology can do to protect your organization. In
this Dark Reading report, we detail how a social engineering attack is developed and what IT professionals
can do to prevent their users from being targets and victims.
How Cybercriminals Choose Their Targets and Tactics: They are out to get you, make no mistake. But
there are things you can do to make sure that your organization is unappealing to a cybercriminal bent on
finding easy pickings. The key is to understand what cybercriminals are looking for and how they go
about the business of infiltrating vulnerable systems and networks.
How Did They Get In? A Guide to Tracking Down the Source of APTs: If you think your organization
hasn’t been affected by an advanced persistent threat, you probably haven’t looked hard enough. Identifying that your organization is under attack is hard enough; determining the scope of infiltration and
damage presents a whole new level of challenge. To effectively protect against APTs, security pros will
need to employ an arsenal of tools in coordinated fashion, as well as develop new understanding of and
approaches to system and data exploits.
PLUS: Find signature reports, such as the InformationWeek Salary Survey, InformationWeek 500 and the
annual State of Security report; full issues; and much more.
Subscribe
reports.informationweek.com
May 2013 14