Get a Pentest and security assessment of your IT network.

News

The processes and tools behind a true APT campaign: Exfiltration

Part five of a series on understanding the processes and tools behind an APT-based incident, CSO examines the exfiltration phase. At this point, all of the other phases are complete, and if the campaign hasn’t been halted before now, it’s likely that data will be removed from the network. Exfiltration is the endgame for an attacker. If the attack and it doesn’t matter if the attack is passive or targeted has made it to this stage, your day is about head up a creek and you’re missing a paddle.”]

Source: https://www.csoonline.com/article/2134267/the-processes-and-tools-behind-a-true-apt-campaign–exfiltration.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months