SlideShare a Scribd company logo
1 of 2
Download to read offline
Initial compromise is the method that is adopted by intruders to enter into the targetted networks.
Generally APTI's use spear phishing attack for this purpose.
Spear phishing is an email that appears to be from an individual or business that is well known to
us. But infact it is not. It is from some criminal hackers who want your confidential information
such as: credit card and bank account numbers, passwords, and other financial information on
your PC.
Spear phishing can be used by the attacker to target any individual by sending him a malicious
mail that contains content which relates to his recent happenings in life. This mail will appear to
the receiver as if it has come from the legitimate friend or relative of him. This might also
resemble as a mail sent by the recipient's boss who demands him to submit a file immediately.
Composing mails in such a way would tempt the receiver in responding before suspecting. Thus,
allowing himself to be a victim. Responding to those mails might allow some backdoors to enter
into his machine and silently monitors his financial transactions in order to capture the bank
account details, passwords etc.
According to the refered document, malicious ZIP file named
“Internal_Discussion_Press_Release_In_Next_Week8.zip” is the payload. This file contained a
malicious executable that installs a custom APT1 backdoor that we call WEBC2-TABLE
Solution
Initial compromise is the method that is adopted by intruders to enter into the targetted networks.
Generally APTI's use spear phishing attack for this purpose.
Spear phishing is an email that appears to be from an individual or business that is well known to
us. But infact it is not. It is from some criminal hackers who want your confidential information
such as: credit card and bank account numbers, passwords, and other financial information on
your PC.
Spear phishing can be used by the attacker to target any individual by sending him a malicious
mail that contains content which relates to his recent happenings in life. This mail will appear to
the receiver as if it has come from the legitimate friend or relative of him. This might also
resemble as a mail sent by the recipient's boss who demands him to submit a file immediately.
Composing mails in such a way would tempt the receiver in responding before suspecting. Thus,
allowing himself to be a victim. Responding to those mails might allow some backdoors to enter
into his machine and silently monitors his financial transactions in order to capture the bank
account details, passwords etc.
According to the refered document, malicious ZIP file named
“Internal_Discussion_Press_Release_In_Next_Week8.zip” is the payload. This file contained a
malicious executable that installs a custom APT1 backdoor that we call WEBC2-TABLE

More Related Content

Similar to Initial compromise is the method that is adopted by intruders to ent.pdf

Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hackingjignesh khunt
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docxMehwishAnsari11
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigationNimishaRawat
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer JungleJason S
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detectionijtsrd
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)Dhrumit Patel
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 

Similar to Initial compromise is the method that is adopted by intruders to ent.pdf (20)

Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Phishing.pptx
Phishing.pptxPhishing.pptx
Phishing.pptx
 
Spoofing
SpoofingSpoofing
Spoofing
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
 
Network security
Network securityNetwork security
Network security
 

More from KARTIKINDIA

We first see what is the Small Intestine – It connects the stomach a.pdf
We first see what is the Small Intestine – It connects the stomach a.pdfWe first see what is the Small Intestine – It connects the stomach a.pdf
We first see what is the Small Intestine – It connects the stomach a.pdfKARTIKINDIA
 
Water needs to be present. The 2 compounds will only react after.pdf
Water needs to be present. The 2 compounds will only react after.pdfWater needs to be present. The 2 compounds will only react after.pdf
Water needs to be present. The 2 compounds will only react after.pdfKARTIKINDIA
 
True.SolutionTrue..pdf
True.SolutionTrue..pdfTrue.SolutionTrue..pdf
True.SolutionTrue..pdfKARTIKINDIA
 
1) option d is the answer, i.e. 11Solution1) option d is the a.pdf
1) option d is the answer, i.e. 11Solution1) option d is the a.pdf1) option d is the answer, i.e. 11Solution1) option d is the a.pdf
1) option d is the answer, i.e. 11Solution1) option d is the a.pdfKARTIKINDIA
 
The same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdf
The same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdfThe same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdf
The same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdfKARTIKINDIA
 
The answer is b) facilitates O2 diffusion through alveolar membrane.pdf
The answer is b) facilitates O2 diffusion through alveolar membrane.pdfThe answer is b) facilitates O2 diffusion through alveolar membrane.pdf
The answer is b) facilitates O2 diffusion through alveolar membrane.pdfKARTIKINDIA
 
The cam material will be UHMW polyethylene because it had the lost c.pdf
The cam material will be UHMW polyethylene because it had the lost c.pdfThe cam material will be UHMW polyethylene because it had the lost c.pdf
The cam material will be UHMW polyethylene because it had the lost c.pdfKARTIKINDIA
 
tan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdf
tan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdftan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdf
tan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdfKARTIKINDIA
 
Ques-1 antinormative collective pro-social behaviorReasonOnlin.pdf
Ques-1 antinormative collective pro-social behaviorReasonOnlin.pdfQues-1 antinormative collective pro-social behaviorReasonOnlin.pdf
Ques-1 antinormative collective pro-social behaviorReasonOnlin.pdfKARTIKINDIA
 
Physical properties can be observed or measured without changing the.pdf
Physical properties can be observed or measured without changing the.pdfPhysical properties can be observed or measured without changing the.pdf
Physical properties can be observed or measured without changing the.pdfKARTIKINDIA
 
(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf
(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf
(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdfKARTIKINDIA
 
Please follow the data and description 1) An association indicate.pdf
Please follow the data and description 1) An association indicate.pdfPlease follow the data and description 1) An association indicate.pdf
Please follow the data and description 1) An association indicate.pdfKARTIKINDIA
 
package chapter15;import javafx.application.Application;import j.pdf
package chapter15;import javafx.application.Application;import j.pdfpackage chapter15;import javafx.application.Application;import j.pdf
package chapter15;import javafx.application.Application;import j.pdfKARTIKINDIA
 
Mononucleotides are monomer of polynucleotides. Its three uses are-.pdf
Mononucleotides are monomer of polynucleotides. Its three uses are-.pdfMononucleotides are monomer of polynucleotides. Its three uses are-.pdf
Mononucleotides are monomer of polynucleotides. Its three uses are-.pdfKARTIKINDIA
 
Intelligence comes from the Latin verb intellegere, which means .pdf
Intelligence comes from the Latin verb intellegere, which means .pdfIntelligence comes from the Latin verb intellegere, which means .pdf
Intelligence comes from the Latin verb intellegere, which means .pdfKARTIKINDIA
 
I agree .Ethernet nodes listen to the medium when they want to tra.pdf
I agree .Ethernet nodes listen to the medium when they want to tra.pdfI agree .Ethernet nodes listen to the medium when they want to tra.pdf
I agree .Ethernet nodes listen to the medium when they want to tra.pdfKARTIKINDIA
 
A. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdf
A. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdfA. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdf
A. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdfKARTIKINDIA
 
Hi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdf
Hi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdfHi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdf
Hi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdfKARTIKINDIA
 
(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf
(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf
(1)White matter in the cerebellumThe arbor vitae refers to the c.pdfKARTIKINDIA
 
Debt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdf
Debt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdfDebt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdf
Debt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdfKARTIKINDIA
 

More from KARTIKINDIA (20)

We first see what is the Small Intestine – It connects the stomach a.pdf
We first see what is the Small Intestine – It connects the stomach a.pdfWe first see what is the Small Intestine – It connects the stomach a.pdf
We first see what is the Small Intestine – It connects the stomach a.pdf
 
Water needs to be present. The 2 compounds will only react after.pdf
Water needs to be present. The 2 compounds will only react after.pdfWater needs to be present. The 2 compounds will only react after.pdf
Water needs to be present. The 2 compounds will only react after.pdf
 
True.SolutionTrue..pdf
True.SolutionTrue..pdfTrue.SolutionTrue..pdf
True.SolutionTrue..pdf
 
1) option d is the answer, i.e. 11Solution1) option d is the a.pdf
1) option d is the answer, i.e. 11Solution1) option d is the a.pdf1) option d is the answer, i.e. 11Solution1) option d is the a.pdf
1) option d is the answer, i.e. 11Solution1) option d is the a.pdf
 
The same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdf
The same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdfThe same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdf
The same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdf
 
The answer is b) facilitates O2 diffusion through alveolar membrane.pdf
The answer is b) facilitates O2 diffusion through alveolar membrane.pdfThe answer is b) facilitates O2 diffusion through alveolar membrane.pdf
The answer is b) facilitates O2 diffusion through alveolar membrane.pdf
 
The cam material will be UHMW polyethylene because it had the lost c.pdf
The cam material will be UHMW polyethylene because it had the lost c.pdfThe cam material will be UHMW polyethylene because it had the lost c.pdf
The cam material will be UHMW polyethylene because it had the lost c.pdf
 
tan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdf
tan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdftan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdf
tan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdf
 
Ques-1 antinormative collective pro-social behaviorReasonOnlin.pdf
Ques-1 antinormative collective pro-social behaviorReasonOnlin.pdfQues-1 antinormative collective pro-social behaviorReasonOnlin.pdf
Ques-1 antinormative collective pro-social behaviorReasonOnlin.pdf
 
Physical properties can be observed or measured without changing the.pdf
Physical properties can be observed or measured without changing the.pdfPhysical properties can be observed or measured without changing the.pdf
Physical properties can be observed or measured without changing the.pdf
 
(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf
(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf
(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf
 
Please follow the data and description 1) An association indicate.pdf
Please follow the data and description 1) An association indicate.pdfPlease follow the data and description 1) An association indicate.pdf
Please follow the data and description 1) An association indicate.pdf
 
package chapter15;import javafx.application.Application;import j.pdf
package chapter15;import javafx.application.Application;import j.pdfpackage chapter15;import javafx.application.Application;import j.pdf
package chapter15;import javafx.application.Application;import j.pdf
 
Mononucleotides are monomer of polynucleotides. Its three uses are-.pdf
Mononucleotides are monomer of polynucleotides. Its three uses are-.pdfMononucleotides are monomer of polynucleotides. Its three uses are-.pdf
Mononucleotides are monomer of polynucleotides. Its three uses are-.pdf
 
Intelligence comes from the Latin verb intellegere, which means .pdf
Intelligence comes from the Latin verb intellegere, which means .pdfIntelligence comes from the Latin verb intellegere, which means .pdf
Intelligence comes from the Latin verb intellegere, which means .pdf
 
I agree .Ethernet nodes listen to the medium when they want to tra.pdf
I agree .Ethernet nodes listen to the medium when they want to tra.pdfI agree .Ethernet nodes listen to the medium when they want to tra.pdf
I agree .Ethernet nodes listen to the medium when they want to tra.pdf
 
A. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdf
A. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdfA. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdf
A. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdf
 
Hi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdf
Hi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdfHi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdf
Hi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdf
 
(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf
(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf
(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf
 
Debt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdf
Debt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdfDebt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdf
Debt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdf
 

Recently uploaded

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 

Recently uploaded (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 

Initial compromise is the method that is adopted by intruders to ent.pdf

  • 1. Initial compromise is the method that is adopted by intruders to enter into the targetted networks. Generally APTI's use spear phishing attack for this purpose. Spear phishing is an email that appears to be from an individual or business that is well known to us. But infact it is not. It is from some criminal hackers who want your confidential information such as: credit card and bank account numbers, passwords, and other financial information on your PC. Spear phishing can be used by the attacker to target any individual by sending him a malicious mail that contains content which relates to his recent happenings in life. This mail will appear to the receiver as if it has come from the legitimate friend or relative of him. This might also resemble as a mail sent by the recipient's boss who demands him to submit a file immediately. Composing mails in such a way would tempt the receiver in responding before suspecting. Thus, allowing himself to be a victim. Responding to those mails might allow some backdoors to enter into his machine and silently monitors his financial transactions in order to capture the bank account details, passwords etc. According to the refered document, malicious ZIP file named “Internal_Discussion_Press_Release_In_Next_Week8.zip” is the payload. This file contained a malicious executable that installs a custom APT1 backdoor that we call WEBC2-TABLE Solution Initial compromise is the method that is adopted by intruders to enter into the targetted networks. Generally APTI's use spear phishing attack for this purpose. Spear phishing is an email that appears to be from an individual or business that is well known to us. But infact it is not. It is from some criminal hackers who want your confidential information such as: credit card and bank account numbers, passwords, and other financial information on your PC. Spear phishing can be used by the attacker to target any individual by sending him a malicious mail that contains content which relates to his recent happenings in life. This mail will appear to the receiver as if it has come from the legitimate friend or relative of him. This might also resemble as a mail sent by the recipient's boss who demands him to submit a file immediately. Composing mails in such a way would tempt the receiver in responding before suspecting. Thus, allowing himself to be a victim. Responding to those mails might allow some backdoors to enter into his machine and silently monitors his financial transactions in order to capture the bank account details, passwords etc. According to the refered document, malicious ZIP file named
  • 2. “Internal_Discussion_Press_Release_In_Next_Week8.zip” is the payload. This file contained a malicious executable that installs a custom APT1 backdoor that we call WEBC2-TABLE