Cookie Monsters and Apt attack

Source: Internet
Author: User
Tags nss labs

Apt attacks just like a child, you steal their brains in various ways to take out cookies. In order to prevent malicious attacks, the fault as the mother failed to discover and prevent cookie thieves such as, in her only to monitor kitchen chairs, closet doors or oven door open. One of the key points in establishing effective defensive target attacks and apt attacks is the need to monitor a wide range of attacks. Cookie thieves have greedy desires and tenacious insistence, and those who want to invade your network and steal your data are also the ones that you just have to pay a little attention to. Then the cookie will disappear from there.


Children often steal their mother's freshly baked biscuits, and this review and today's target attacks have many similarities with apt-advanced persistent penetration attacks (persistent Threat, APT). Children can think of many ways to get biscuits.

Here are some of the ways that kids will try and really get to the cookie:

Stand in the kitchen chair and get a cookie jar that's banned from stealing.

? Use a broom or mop rod to move the cookie jar to the edge of the cabinet. To get it down. After taking out a few cookies. Push the jar forward. And get it back to where it belongs.

Sneak up and get freshly baked. Waiting for a cold cookie.

What does this have to do with targeted attacks and apt attacks? To our surprise, it was. Mothers become sensitive to sound surveillance: the sound of moving kitchen chairs, the squeak of opening cupboard doors with broom handles, and the opening of an oven door that secretly takes a warm biscuit. In addition, they are good at monitoring the "cookie attack tactics" that have appeared. When children want to use different routes to steal cookies, they have a hound-like alertness, can see the child want to use "Social project Trap" socialengineering, while using "I love your Mother" warm hug, at the same time will put out a hand from behind her stole cookies.

In fact, the attacker is driven by some kind of motive, just like you who used to be a Cookie monster. Convert your personal data and communications information into cash or intelligence to pay their bills, so. Attackers will use a variety of means and methods to invade your network.

The main reason you need to put the threat discovery device TDA in your list:

? Provides visibility, insight, and control over the network range required to reduce the risk of apt and targeted attacks. Detect and identify evasive threats in real time and in a unique way. and provide the required in-depth analysis and actionable intelligence to prevent, detect, and suppress attacks against corporate data.

The vulnerability Management Service provides on-demand network discovery, asset prioritization, application and System vulnerability assessment.

? The TDA deep packet detection and intrusion prevention system (IPS) feature can eliminate vulnerabilities and reduce repair costs,

This can be achieved by providing a virtual fix to mask the vulnerability at a high speed. No need to wait for vendor to provide patches or disrupt standard repair cycles.

In short, given the recent NSS labs intrusion test results, the focus is on dike speculation and over-believing "warning" signs. In contrast, the Trend Micro TDA is a sign that you can trust.

To learn about the Trend Micro threat Discovery Device--TDA, please click on the link:

Http://www.trendmicro.com.cn/cn/enterprise/security-management/threat-discovery-appliance/index.html

Cookie Monsters and Apt attack

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.