How do APTs work? The Lifecycle of Advanced Persistent Threats (Infographic)

APT-DarthAdvanced Persistent Threats (or APTs) are a kind of malware that can go undetected for long periods of time, waiting for the opportunity to strike, and leaking out your data secretly. To help you understand how APTs work, we created an interesting infographic showing the lifecycle of an APT.

The APT lifecycle starts with an entry point on your computer network — perhaps by an infected USB device, a phishing email, or a drive-by download — before it calls home for instructions on what to do next.

Once the APT has its marching orders from the command and control (C&C) server, it begins to spread through your network, calling home with interesting data, and hiding itself from detection.

Check out the infographic below by clicking on the image to open it as a PDF for a closer look.

Infographic: Advanced Persistent Threats Uncovered

Sophos-APT-lifecycle

Advanced Threat Protection in UTM Accelerated (9.2)

Advanced Threat Protection in Sophos UTM Accelerated (9.2) is not just a single technology — instead, it provides layers of protection for a defense in depth.

You still need your “standard” protection in place and kept up to date. That means you need the technology to protect you from viruses, email spamweb and other malwarephishing attacks, and more. Those are still the most common tools used in the initial stages of a targeted APT attack.

If you want to find out more about how APTs work and what you can do to protect yourself against them, download our free whitepaper (registration required).

Presentation (Video): A Pragmatic Approach to Advanced Persistent Threats

Security expert John Shier and senior product specialist Barbara Hudson explore how today’s targeted attacks typically work and what kind of protection is available to help reduce the risk of an attack.

5 thoughts on “How do APTs work? The Lifecycle of Advanced Persistent Threats (Infographic)

  1. Pingback: Sophos at Infosecurity Europe 2014: Credit card crime, Android malware, and a look inside SophosLabs | Sophos Blog

  2. Pingback: Sophos news in review: Partner conferences kick off, Target CEO resigns, and is antivirus ‘dead’? | Sophos Blog

  3. Pingback: The next generation of the PlugX APT – new SophosLabs research | Sophos Blog

  4. Pingback: What the security industry can learn from a great World Cup defense | Sophos Blog

  5. Pingback: What’s the deal with the Home Depot data breach? | Sophos Blog

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s