 APT is the most advanced
cyber threat in the security
landscape.
 Cyber actors are progressed to
the extent that they can counter
attack any kind of defensive
countermeasures.
 One such perilous attack that
intrudes into a system and
mines private data is advanced
persistent threat.
BREAK THE
CHAIN
7 P H A S E S O F A D VA N C E D P E R S I S T E N T T H R EAT S
PHASE 01
 The intruder researches the victim to
gain knowledge about vulnerability in
the organization and the IT
infrastructure.
 The attacker finds the right contact
information to target by spear-
phishing.
SURVEILLANCE
PHASE 02
• The intruder builds a payload that can be
transported to the targeted victim’s computer.
• Thus the vulnerability found in the
Surveillance phrase is exploited with a Trojan
packaged with a delivery system.
ARMAMENT
PHASE 03
 The intruder finds means to deliver
this weaponized payload to the
victim’s computer.
 The three most prevalent forms of
delivery are email, website and a
USB stick.
CARRIAGE
PHASE 04
• The intruder triggers the execution of this
weaponized payload and exploits vulnerabilities in
these files to trigger the execution of malicious
code.
MANIPULATION
PHASE 05
 The intruder gains easy access to the
targeted victim’s system by deploying a
malicious Trojan.
DEPLOYMENT
PHASE 06
• After gaining the access, the payload initiates the
connection with the intruder’s server, thereby
making it easier for the intruder to shadow the
compromised system and issue commands
through the network.
CONTROL
PHASE 07
 This is the final phase where the
intruder has everything to exfiltrate the
right confidential information,
compromise data integrity or
availability.
ACTION
THE GOAL OF INTRUSION MAY SIMPLY
BE TO GAIN ACCESS TO THE SECURED
SYSTEM OR NETWORK.
BUT APTS CAN SURVEY THE SYSTEM FOR
WEEKS, MONTHS OR EVEN YEARS TO TAKE
SMALL STEPS TO ACCOMPLISH THE MISSION.
HOW INSPIRISYS CAN HELP
YOUR ORGANIZATION TO
DEFEND AGAINST APT?
As an integral piece of an Adaptive
Defence strategy, our state-of-the-
art advanced persistent threat
protection solutions protect against
cyber-attacks with technologies
such as
FIREWALL
First Layer Of
Defence Against APT
WEB
APPLICATION
FIREWALL
Monitor And Block
Malicious Web Traffic
ANTIVIRUS
Detect And Prevent A
Wide Range Of APT
Malware, Trojans
And Viruses
INTRUSION
PREVENTION
SYSTEM
Detect Malicious
Activities In The
System And Prevent
Any Possible Intrusion
SANDBOX
Behaviour Analysis To
Protect Against APT
VIRTUAL
PRIVATE
NETWORK
Encrypted Connection
To Ensure Sensitive
Data Is Safely
Transmitted
ADVANCED
EMAIL
PROTECTION
Scan And Block APT
Malware In Emails
Inspirisys Anti-APT Solutions
Bolstered With Advanced
Persistent Tools Reinforced To
Close The Response Gap By
Detecting Malicious Activities
Faster.
TO LEARN MORE ABOUT ISL ANTI-APT SOLUTIONS
Reach Out To reachus@inspirisys.com
Thank You

Break the chain - 7 phases of Advanced Persistent Threats

  • 1.
     APT isthe most advanced cyber threat in the security landscape.  Cyber actors are progressed to the extent that they can counter attack any kind of defensive countermeasures.  One such perilous attack that intrudes into a system and mines private data is advanced persistent threat.
  • 2.
    BREAK THE CHAIN 7 PH A S E S O F A D VA N C E D P E R S I S T E N T T H R EAT S
  • 3.
    PHASE 01  Theintruder researches the victim to gain knowledge about vulnerability in the organization and the IT infrastructure.  The attacker finds the right contact information to target by spear- phishing. SURVEILLANCE
  • 4.
    PHASE 02 • Theintruder builds a payload that can be transported to the targeted victim’s computer. • Thus the vulnerability found in the Surveillance phrase is exploited with a Trojan packaged with a delivery system. ARMAMENT
  • 5.
    PHASE 03  Theintruder finds means to deliver this weaponized payload to the victim’s computer.  The three most prevalent forms of delivery are email, website and a USB stick. CARRIAGE
  • 6.
    PHASE 04 • Theintruder triggers the execution of this weaponized payload and exploits vulnerabilities in these files to trigger the execution of malicious code. MANIPULATION
  • 7.
    PHASE 05  Theintruder gains easy access to the targeted victim’s system by deploying a malicious Trojan. DEPLOYMENT
  • 8.
    PHASE 06 • Aftergaining the access, the payload initiates the connection with the intruder’s server, thereby making it easier for the intruder to shadow the compromised system and issue commands through the network. CONTROL
  • 9.
    PHASE 07  Thisis the final phase where the intruder has everything to exfiltrate the right confidential information, compromise data integrity or availability. ACTION
  • 10.
    THE GOAL OFINTRUSION MAY SIMPLY BE TO GAIN ACCESS TO THE SECURED SYSTEM OR NETWORK.
  • 11.
    BUT APTS CANSURVEY THE SYSTEM FOR WEEKS, MONTHS OR EVEN YEARS TO TAKE SMALL STEPS TO ACCOMPLISH THE MISSION.
  • 12.
    HOW INSPIRISYS CANHELP YOUR ORGANIZATION TO DEFEND AGAINST APT? As an integral piece of an Adaptive Defence strategy, our state-of-the- art advanced persistent threat protection solutions protect against cyber-attacks with technologies such as
  • 13.
  • 14.
  • 15.
    ANTIVIRUS Detect And PreventA Wide Range Of APT Malware, Trojans And Viruses
  • 16.
    INTRUSION PREVENTION SYSTEM Detect Malicious Activities InThe System And Prevent Any Possible Intrusion
  • 17.
  • 18.
    VIRTUAL PRIVATE NETWORK Encrypted Connection To EnsureSensitive Data Is Safely Transmitted
  • 19.
  • 20.
    Inspirisys Anti-APT Solutions BolsteredWith Advanced Persistent Tools Reinforced To Close The Response Gap By Detecting Malicious Activities Faster.
  • 21.
    TO LEARN MOREABOUT ISL ANTI-APT SOLUTIONS Reach Out To reachus@inspirisys.com Thank You