An advanced persistent threat (APT) is a targeted cyber attack where an intruder gains access to a network and remains undetected for an extended period. APTs are initiated to steal highly sensitive data and are typically orchestrated by well-funded nation-state cybercriminal groups. Techniques used include spear phishing, zero-day exploits, watering hole attacks, supply chain attacks, credential theft, command-and-control servers, and evasion strategies. The sequential approach involves gaining access, establishing a foothold, covering tracks, gaining higher access, moving laterally, staging the attack, taking the data, and remaining undetected.
Infostealers Dominate as Lumma Stealer Detections Soar by Almost 400%
Cybersecurity firm ESET reported a 369% increase in detections of the Lumma Stealer infostealer malware in the second half of 2024. The malware targets two-factor