The processes and tools behind a true APT campaign: Exploitation and Installation

In this stage of the APT campaign, conditions have taken a turn for the worse as the attackers have successfully delivered their malicious content.

By Steve Ragan, CSO |  Security, Advanced Persistent Threats, insider

In part three of a series on understanding the processes and tools behind an APT-based incident, CSO examines the process of exploitation and installation. At this stage, things have started to go wrong, as the attacker(s) have been successful in delivering their malicious payload.

[New DDoS malware targets Linux and Windows systems]

Make no mistake, if the attacker's campaign has made it this far, you have a problem, but you also have a chance to fix it.

To continue reading, register here to become an Insider. It's FREE to join.

This article is part of a series about APT campaigns. The topics covered in this series are:
Reconnaissance
Weaponization and Delivery
Exploitation and Installation
Command and Control, and
Exfiltration

Don't miss...


18 hot IT certifications for 2014

6 IT hiring tips to weed out the duds

The helpful, handy, FREE programs your new PC needs

  Sign me up for ITworld's FREE daily newsletter!
Email: 
 


Originally published on CSO |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness