The processes and tools behind a true APT campaign: Reconnaissance

Reconnaissance marks the first step in the APT campaign, where attackers identify their targets and how to attack them

By Steve Ragan, CSO |  Security, Advanced Persistent Threats, insider

In part one of a series on understanding the processes and tools behind an APT-based incident, CSO examines the reconnaissance aspect of an attacker's campaign. This is the first step of many, and often helps the attacker identify who to attack and how.

Personal Information: People are your weakest link

All too often, the information that harms an organization or person the most is something that wasn't viewed as important enough to protect to begin with. This can be anything from telephone or email directory listings, metadata within a document passed around online, to an executive's full name and corporate biography.

To continue reading, register here to become an Insider. It's FREE to join!

This article is part of a series about APT campaigns. The topics covered in this series are:
Reconnaissance
Weaponization and Delivery
Exploitation and Installation
Command and Control, and
Exfiltration

Don't miss...


18 hot IT certifications for 2014

6 IT hiring tips to weed out the duds

The helpful, handy, FREE programs your new PC needs

  Sign me up for ITworld's FREE daily newsletter!
Email: 
 


Originally published on CSO |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness