SlideShare a Scribd company logo
Persistence is Key:
Advanced Persistent
Threats
By: Sameer Thadani
Objectives
What is an APT
What is an AET
Past targets
What to look for in the future
Advanced Persistent Threats
 Advanced
 Higher levels of sophistication
 Has access to Zero-Day exploits
 Adapts to the victims defenses
 Persistent
 Attacks are specific
 Continue until the specific goals are met
 Intend to maintain communication with victim
compromised systems
 Threats
 Real power players behind attacks such as nation-states
 Not your mom and pop hacking job
APT Malware Anatomy
APT Attack Flow
Step 1 • Reconnaissance
Step 2 • Initial Intrusion into the Network
Sep 3 • Establish a Backdoor into the Network
Step 5 • Install Various Utilities
Step 6 • Lateral Movement and Data Exfiltration
Reconnaissance
First stage of an APT
Learning about the victims business
processes and technology
Tools
Whois
Nmap
Netcraft.com
Social Media Searching
Acting SKILLZ
Network Access
Spear-Phishing = #1 Way
Targeting specific high value people
Sending highly realistic email addresses
with attachments
Attachments include remote trojans or
malware
BUT WAIT, how does my malware get
passed IDS/IPS, Firewalls, and Email
Filters?
ADVANCED EVASION TECHNIQUES
Advance Evasion Techniques
Key techniques used to disguise threats to
evade and bypass security systems
Why are they advanced?
They combine multiple evasion
techniques that focus on multiple protocol
layers.
Evasions change during the attack
They allow malicious payloads or
exploits, such as malware to look normal
A wide variety of techniques
Combinations are endless
Polymorphic Shellcode
Constantly changing packet injected
code… using ADMmutate
Polymorphic Shellcode
Packet Splitting
Establish Backdoors
Establish backdoors
Backdoors allow attackers to stay in
constant contact with the compromised
machine. Ex. Poison Ivy
Install Utilities
Install key-logger
Ex: iSam
Lateral Movement
 Compromise more machines on the network and setup more
back doors, this allows for lateral movement and persistence
 Ex. TRiAD Botnet Control System
 EXFILTRATE DATA!
Why is this happening?
Nation-State intelligence to aid in wartime
strategy and exploitation
Diminish competition and improve strategic
advantage by stealing intellectual property
To extort or ruin VIP
To gain $$$$ and gain economic power
Learning from the past…
Google - Hydraq
RSA SecureID
Iran’s Nuclear Plant - Stuxnet
All targeted attacks on huge companies
Anyone can be targeted.
Preparing for the Future..
Keep your eyes open
Elevated log-ons at unexpected times
Finding any backdoor Trojans
Look for any anomalies for information flow
Look for HUGE data bundles
Questions?
Sources
 http://www.infoworld.com/article/2615666/security/5-signs-
you-ve-been-hit-with-an-advanced-persistent-threat.html
 https://www.youtube.com/watch?v=ugXyzkkYN9E
 https://www.youtube.com/watch?v=J9MmrqatA1w
 http://searchsecurity.techtarget.com/definition/advanced-
persistent-threat-APT
 http://www.symantec.com/theme.jsp?themeid=apt-
infographic-1
 http://searchsecurity.techtarget.com/definition/advanced-
evasion-technique-AET
 http://www.csoonline.com/article/2138125/what-are-
advanced-evasion-techniques-dont-expect-cios-to-know-
says-mcafee.html
 Issa.org

More Related Content

PDF
Introduction to the advanced persistent threat and hactivism
PDF
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PPTX
Advanced persistent threat (apt)
PPTX
Understanding advanced persistent threats (APT)
PPTX
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
PPTX
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
PDF
Apt sharing tisa protalk 2-2554
Introduction to the advanced persistent threat and hactivism
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Advanced Persistent Threats (APTs) - Information Security Management
Advanced persistent threat (apt)
Understanding advanced persistent threats (APT)
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
Apt sharing tisa protalk 2-2554

What's hot (20)

PPTX
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
PPTX
Common Techniques To Identify Advanced Persistent Threat (APT)
PPTX
Incident Response: Validation, Containment & Forensics
PDF
Deception Technology: Use Cases & Implementation Approaches
PPT
Security Intelligence: Advanced Persistent Threats
PDF
Combating Advanced Persistent Threats with Flow-based Security Monitoring
PPTX
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
PPTX
Career Guidance on Cybersecurity by Mohammed Adam
PPT
Networking and penetration testing
PDF
Cambodia CERT Seminar: Incident response for ransomeware attacks
PPTX
Advanced Persistent Threats
PDF
Penetration testing & Ethical Hacking
DOC
Honeypot Essentials
PPT
Safeguard your enterprise against ransomware
PDF
The Cost of Doing Nothing: A Ransomware Backup Story
PDF
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
PPTX
What is network security and Types
PDF
Sophisticated Attacks vs. Advanced Persistent Security
PDF
Hiding in Plain Sight: The Danger of Known Vulnerabilities
PPTX
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Common Techniques To Identify Advanced Persistent Threat (APT)
Incident Response: Validation, Containment & Forensics
Deception Technology: Use Cases & Implementation Approaches
Security Intelligence: Advanced Persistent Threats
Combating Advanced Persistent Threats with Flow-based Security Monitoring
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
Career Guidance on Cybersecurity by Mohammed Adam
Networking and penetration testing
Cambodia CERT Seminar: Incident response for ransomeware attacks
Advanced Persistent Threats
Penetration testing & Ethical Hacking
Honeypot Essentials
Safeguard your enterprise against ransomware
The Cost of Doing Nothing: A Ransomware Backup Story
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
What is network security and Types
Sophisticated Attacks vs. Advanced Persistent Security
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Ad

Similar to Persistence is Key: Advanced Persistent Threats (20)

PDF
Advanced Persistent Threats: How They Sneak In and Stay Hidden
PPTX
Understanding-and-Defending-Against-Advanced-Persistent-Threats-APT.pptx.pptx
PPTX
Ethical Hacking
PPTX
Ethical Hacking and Network Defence 1.pptx
PPTX
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
PPTX
Seucrity in a nutshell
PDF
Apt zero day malware
PPTX
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
PDF
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
PPTX
Ethical-Hacking-ppt.pptx
PPTX
panw-cortex-xdr-customer-presentation.pptx
PDF
From Identity to Ownership Theft
PDF
Types-of-Cyber-Attacks-E-book.pdf
PPTX
Cse ethical hacking ppt
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
Basics of System Security and Tools
PPT
Introduction to Hacking
PPTX
Hvordan stopper du CryptoLocker?
PDF
The Threat Landscape & Network Security Measures
Advanced Persistent Threats: How They Sneak In and Stay Hidden
Understanding-and-Defending-Against-Advanced-Persistent-Threats-APT.pptx.pptx
Ethical Hacking
Ethical Hacking and Network Defence 1.pptx
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
Seucrity in a nutshell
Apt zero day malware
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Ethical-Hacking-ppt.pptx
panw-cortex-xdr-customer-presentation.pptx
From Identity to Ownership Theft
Types-of-Cyber-Attacks-E-book.pdf
Cse ethical hacking ppt
CSE-Ethical-Hacking-ppt.pptx
Basics of System Security and Tools
Introduction to Hacking
Hvordan stopper du CryptoLocker?
The Threat Landscape & Network Security Measures
Ad

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Machine learning based COVID-19 study performance prediction
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Modernizing your data center with Dell and AMD
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The AUB Centre for AI in Media Proposal.docx
NewMind AI Monthly Chronicles - July 2025
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
NewMind AI Weekly Chronicles - August'25 Week I
MYSQL Presentation for SQL database connectivity
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
A Presentation on Artificial Intelligence
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
Machine learning based COVID-19 study performance prediction
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Network Security Unit 5.pdf for BCA BBA.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Persistence is Key: Advanced Persistent Threats