SlideShare a Scribd company logo
Initial compromise is the method that is adopted by intruders to enter into the targetted networks.
Generally APTI's use spear phishing attack for this purpose.
Spear phishing is an email that appears to be from an individual or business that is well known to
us. But infact it is not. It is from some criminal hackers who want your confidential information
such as: credit card and bank account numbers, passwords, and other financial information on
your PC.
Spear phishing can be used by the attacker to target any individual by sending him a malicious
mail that contains content which relates to his recent happenings in life. This mail will appear to
the receiver as if it has come from the legitimate friend or relative of him. This might also
resemble as a mail sent by the recipient's boss who demands him to submit a file immediately.
Composing mails in such a way would tempt the receiver in responding before suspecting. Thus,
allowing himself to be a victim. Responding to those mails might allow some backdoors to enter
into his machine and silently monitors his financial transactions in order to capture the bank
account details, passwords etc.
According to the refered document, malicious ZIP file named
“Internal_Discussion_Press_Release_In_Next_Week8.zip” is the payload. This file contained a
malicious executable that installs a custom APT1 backdoor that we call WEBC2-TABLE
Solution
Initial compromise is the method that is adopted by intruders to enter into the targetted networks.
Generally APTI's use spear phishing attack for this purpose.
Spear phishing is an email that appears to be from an individual or business that is well known to
us. But infact it is not. It is from some criminal hackers who want your confidential information
such as: credit card and bank account numbers, passwords, and other financial information on
your PC.
Spear phishing can be used by the attacker to target any individual by sending him a malicious
mail that contains content which relates to his recent happenings in life. This mail will appear to
the receiver as if it has come from the legitimate friend or relative of him. This might also
resemble as a mail sent by the recipient's boss who demands him to submit a file immediately.
Composing mails in such a way would tempt the receiver in responding before suspecting. Thus,
allowing himself to be a victim. Responding to those mails might allow some backdoors to enter
into his machine and silently monitors his financial transactions in order to capture the bank
account details, passwords etc.
According to the refered document, malicious ZIP file named
“Internal_Discussion_Press_Release_In_Next_Week8.zip” is the payload. This file contained a
malicious executable that installs a custom APT1 backdoor that we call WEBC2-TABLE

More Related Content

Similar to Initial compromise is the method that is adopted by intruders to ent.pdf

Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
sonalikharade3
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
JIJO CLEETUS
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hackingjignesh khunt
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
MehwishAnsari11
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
Johnlery Guzman
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
NimishaRawat
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
Forrester High School
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
Jason S
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
Rapid7
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
Deepak Kumar (D3)
 
Phishing.pptx
Phishing.pptxPhishing.pptx
Phishing.pptx
DakshParashar7
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
ijtsrd
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
Dhrumit Patel
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
ssuser64f8f8
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
Insiya Tarwala
 
Network security
Network securityNetwork security
Network security
Md. Asifur Rahman Siddiki
 

Similar to Initial compromise is the method that is adopted by intruders to ent.pdf (20)

Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Phishing.pptx
Phishing.pptxPhishing.pptx
Phishing.pptx
 
Spoofing
SpoofingSpoofing
Spoofing
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
 
Network security
Network securityNetwork security
Network security
 

More from KARTIKINDIA

We first see what is the Small Intestine – It connects the stomach a.pdf
We first see what is the Small Intestine – It connects the stomach a.pdfWe first see what is the Small Intestine – It connects the stomach a.pdf
We first see what is the Small Intestine – It connects the stomach a.pdf
KARTIKINDIA
 
Water needs to be present. The 2 compounds will only react after.pdf
Water needs to be present. The 2 compounds will only react after.pdfWater needs to be present. The 2 compounds will only react after.pdf
Water needs to be present. The 2 compounds will only react after.pdf
KARTIKINDIA
 
True.SolutionTrue..pdf
True.SolutionTrue..pdfTrue.SolutionTrue..pdf
True.SolutionTrue..pdf
KARTIKINDIA
 
1) option d is the answer, i.e. 11Solution1) option d is the a.pdf
1) option d is the answer, i.e. 11Solution1) option d is the a.pdf1) option d is the answer, i.e. 11Solution1) option d is the a.pdf
1) option d is the answer, i.e. 11Solution1) option d is the a.pdf
KARTIKINDIA
 
The same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdf
The same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdfThe same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdf
The same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdf
KARTIKINDIA
 
The answer is b) facilitates O2 diffusion through alveolar membrane.pdf
The answer is b) facilitates O2 diffusion through alveolar membrane.pdfThe answer is b) facilitates O2 diffusion through alveolar membrane.pdf
The answer is b) facilitates O2 diffusion through alveolar membrane.pdf
KARTIKINDIA
 
The cam material will be UHMW polyethylene because it had the lost c.pdf
The cam material will be UHMW polyethylene because it had the lost c.pdfThe cam material will be UHMW polyethylene because it had the lost c.pdf
The cam material will be UHMW polyethylene because it had the lost c.pdf
KARTIKINDIA
 
tan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdf
tan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdftan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdf
tan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdf
KARTIKINDIA
 
Ques-1 antinormative collective pro-social behaviorReasonOnlin.pdf
Ques-1 antinormative collective pro-social behaviorReasonOnlin.pdfQues-1 antinormative collective pro-social behaviorReasonOnlin.pdf
Ques-1 antinormative collective pro-social behaviorReasonOnlin.pdf
KARTIKINDIA
 
Physical properties can be observed or measured without changing the.pdf
Physical properties can be observed or measured without changing the.pdfPhysical properties can be observed or measured without changing the.pdf
Physical properties can be observed or measured without changing the.pdf
KARTIKINDIA
 
(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf
(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf
(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf
KARTIKINDIA
 
Please follow the data and description 1) An association indicate.pdf
Please follow the data and description 1) An association indicate.pdfPlease follow the data and description 1) An association indicate.pdf
Please follow the data and description 1) An association indicate.pdf
KARTIKINDIA
 
package chapter15;import javafx.application.Application;import j.pdf
package chapter15;import javafx.application.Application;import j.pdfpackage chapter15;import javafx.application.Application;import j.pdf
package chapter15;import javafx.application.Application;import j.pdf
KARTIKINDIA
 
Mononucleotides are monomer of polynucleotides. Its three uses are-.pdf
Mononucleotides are monomer of polynucleotides. Its three uses are-.pdfMononucleotides are monomer of polynucleotides. Its three uses are-.pdf
Mononucleotides are monomer of polynucleotides. Its three uses are-.pdf
KARTIKINDIA
 
Intelligence comes from the Latin verb intellegere, which means .pdf
Intelligence comes from the Latin verb intellegere, which means .pdfIntelligence comes from the Latin verb intellegere, which means .pdf
Intelligence comes from the Latin verb intellegere, which means .pdf
KARTIKINDIA
 
I agree .Ethernet nodes listen to the medium when they want to tra.pdf
I agree .Ethernet nodes listen to the medium when they want to tra.pdfI agree .Ethernet nodes listen to the medium when they want to tra.pdf
I agree .Ethernet nodes listen to the medium when they want to tra.pdf
KARTIKINDIA
 
A. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdf
A. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdfA. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdf
A. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdf
KARTIKINDIA
 
Hi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdf
Hi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdfHi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdf
Hi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdf
KARTIKINDIA
 
(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf
(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf
(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf
KARTIKINDIA
 
Debt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdf
Debt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdfDebt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdf
Debt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdf
KARTIKINDIA
 

More from KARTIKINDIA (20)

We first see what is the Small Intestine – It connects the stomach a.pdf
We first see what is the Small Intestine – It connects the stomach a.pdfWe first see what is the Small Intestine – It connects the stomach a.pdf
We first see what is the Small Intestine – It connects the stomach a.pdf
 
Water needs to be present. The 2 compounds will only react after.pdf
Water needs to be present. The 2 compounds will only react after.pdfWater needs to be present. The 2 compounds will only react after.pdf
Water needs to be present. The 2 compounds will only react after.pdf
 
True.SolutionTrue..pdf
True.SolutionTrue..pdfTrue.SolutionTrue..pdf
True.SolutionTrue..pdf
 
1) option d is the answer, i.e. 11Solution1) option d is the a.pdf
1) option d is the answer, i.e. 11Solution1) option d is the a.pdf1) option d is the answer, i.e. 11Solution1) option d is the a.pdf
1) option d is the answer, i.e. 11Solution1) option d is the a.pdf
 
The same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdf
The same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdfThe same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdf
The same Mechanisms of genetic exchange in bacteria 1. Conjugation .pdf
 
The answer is b) facilitates O2 diffusion through alveolar membrane.pdf
The answer is b) facilitates O2 diffusion through alveolar membrane.pdfThe answer is b) facilitates O2 diffusion through alveolar membrane.pdf
The answer is b) facilitates O2 diffusion through alveolar membrane.pdf
 
The cam material will be UHMW polyethylene because it had the lost c.pdf
The cam material will be UHMW polyethylene because it had the lost c.pdfThe cam material will be UHMW polyethylene because it had the lost c.pdf
The cam material will be UHMW polyethylene because it had the lost c.pdf
 
tan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdf
tan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdftan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdf
tan(x)=1x=pi4Solutiontan(x)=1x=pi4.pdf
 
Ques-1 antinormative collective pro-social behaviorReasonOnlin.pdf
Ques-1 antinormative collective pro-social behaviorReasonOnlin.pdfQues-1 antinormative collective pro-social behaviorReasonOnlin.pdf
Ques-1 antinormative collective pro-social behaviorReasonOnlin.pdf
 
Physical properties can be observed or measured without changing the.pdf
Physical properties can be observed or measured without changing the.pdfPhysical properties can be observed or measured without changing the.pdf
Physical properties can be observed or measured without changing the.pdf
 
(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf
(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf
(E) a+ and b+ are more closely linked than a+ and c+.   If two gen.pdf
 
Please follow the data and description 1) An association indicate.pdf
Please follow the data and description 1) An association indicate.pdfPlease follow the data and description 1) An association indicate.pdf
Please follow the data and description 1) An association indicate.pdf
 
package chapter15;import javafx.application.Application;import j.pdf
package chapter15;import javafx.application.Application;import j.pdfpackage chapter15;import javafx.application.Application;import j.pdf
package chapter15;import javafx.application.Application;import j.pdf
 
Mononucleotides are monomer of polynucleotides. Its three uses are-.pdf
Mononucleotides are monomer of polynucleotides. Its three uses are-.pdfMononucleotides are monomer of polynucleotides. Its three uses are-.pdf
Mononucleotides are monomer of polynucleotides. Its three uses are-.pdf
 
Intelligence comes from the Latin verb intellegere, which means .pdf
Intelligence comes from the Latin verb intellegere, which means .pdfIntelligence comes from the Latin verb intellegere, which means .pdf
Intelligence comes from the Latin verb intellegere, which means .pdf
 
I agree .Ethernet nodes listen to the medium when they want to tra.pdf
I agree .Ethernet nodes listen to the medium when they want to tra.pdfI agree .Ethernet nodes listen to the medium when they want to tra.pdf
I agree .Ethernet nodes listen to the medium when they want to tra.pdf
 
A. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdf
A. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdfA. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdf
A. 1.Virus modified exoxomes are specialized form of nano sized vesi.pdf
 
Hi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdf
Hi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdfHi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdf
Hi,pease find ansers for Questions1.5 Fill in the Blanksa) The.pdf
 
(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf
(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf
(1)White matter in the cerebellumThe arbor vitae refers to the c.pdf
 
Debt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdf
Debt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdfDebt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdf
Debt ratio=Debttotal assetsHence debt=0.55total assetsHence tot.pdf
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

Initial compromise is the method that is adopted by intruders to ent.pdf

  • 1. Initial compromise is the method that is adopted by intruders to enter into the targetted networks. Generally APTI's use spear phishing attack for this purpose. Spear phishing is an email that appears to be from an individual or business that is well known to us. But infact it is not. It is from some criminal hackers who want your confidential information such as: credit card and bank account numbers, passwords, and other financial information on your PC. Spear phishing can be used by the attacker to target any individual by sending him a malicious mail that contains content which relates to his recent happenings in life. This mail will appear to the receiver as if it has come from the legitimate friend or relative of him. This might also resemble as a mail sent by the recipient's boss who demands him to submit a file immediately. Composing mails in such a way would tempt the receiver in responding before suspecting. Thus, allowing himself to be a victim. Responding to those mails might allow some backdoors to enter into his machine and silently monitors his financial transactions in order to capture the bank account details, passwords etc. According to the refered document, malicious ZIP file named “Internal_Discussion_Press_Release_In_Next_Week8.zip” is the payload. This file contained a malicious executable that installs a custom APT1 backdoor that we call WEBC2-TABLE Solution Initial compromise is the method that is adopted by intruders to enter into the targetted networks. Generally APTI's use spear phishing attack for this purpose. Spear phishing is an email that appears to be from an individual or business that is well known to us. But infact it is not. It is from some criminal hackers who want your confidential information such as: credit card and bank account numbers, passwords, and other financial information on your PC. Spear phishing can be used by the attacker to target any individual by sending him a malicious mail that contains content which relates to his recent happenings in life. This mail will appear to the receiver as if it has come from the legitimate friend or relative of him. This might also resemble as a mail sent by the recipient's boss who demands him to submit a file immediately. Composing mails in such a way would tempt the receiver in responding before suspecting. Thus, allowing himself to be a victim. Responding to those mails might allow some backdoors to enter into his machine and silently monitors his financial transactions in order to capture the bank account details, passwords etc. According to the refered document, malicious ZIP file named
  • 2. “Internal_Discussion_Press_Release_In_Next_Week8.zip” is the payload. This file contained a malicious executable that installs a custom APT1 backdoor that we call WEBC2-TABLE