In APT attacks, hackers can try to enter the network with more than one method. For example, they can use the credentials of employees or business partners to gain initial access, called phishing attacks. In this way, hackers can remain in the system for a long time without being noticed.
Since APT attacks are such a broad term, there are multiple stages to APTs, but generally three basic stages are considered:
Stage 1: Infiltration
In the first stage, which is the infiltration stage, as we mentioned netherlands telegram number earlier, they try to enter the system with phishing and similar methods. The prominent tactic in the infiltration stage is to launch simultaneous DDoS attacks. By using DDoS, hackers distract personnel and facilitate network breaches.
Other attack methods that APT hackers try during the infiltration phase are as follows:
Phishing
SQL injections
Zero-day exploits
RFI (remote file attachment)
Malware
DNS tunneling
XSS (cross-site scripting)
After the first stage, APT hackers create a trojan. Trojan helps APT hackers to control the system remotely.
Phase 2: Expansion
The second stage starts after the hackers enter the system. They expand and deepen their access and then make sure that their access is not revoked. They do this by collecting additional passwords or, if the original password they stole is changed, by using another malware called a “Trojan Horse”. In this way, the hackers start to become permanent in the system and then they start to check for security vulnerabilities, more information collection or deep access options about the network they entered.
Hackers who want to make sure that their last transactions are not canceled, resort to malware again and add personnel who have access to many valuable data to their targets. In the last stage of being sure, they generally start the brute force attack tactic, also known as "Brute Force".
To learn how to prevent DDoS attacks, you can review our blog post here .
-
- Posts: 12
- Joined: Tue Jan 07, 2025 4:17 am