{"id":3246,"date":"2024-09-13T08:44:41","date_gmt":"2024-09-12T22:44:41","guid":{"rendered":"https:\/\/gabey.com.au\/gabeyinfo\/?p=3246"},"modified":"2024-10-04T17:58:55","modified_gmt":"2024-10-04T07:58:55","slug":"unveiling-the-threat-how-advanced-persistent-threats-apts-persist-as-stealthy-cyber-attacks","status":"publish","type":"post","link":"https:\/\/gabey.com.au\/gabeyinfo\/index.php\/2024\/09\/13\/unveiling-the-threat-how-advanced-persistent-threats-apts-persist-as-stealthy-cyber-attacks\/","title":{"rendered":"Unveiling the Threat: How Advanced Persistent Threats (APTs) Persist as Stealthy Cyber Attacks"},"content":{"rendered":"\n<style type=\"text\/css\">\n<!--\n\n.prisna-gwt-align-left {\n\ttext-align: left !important;\n}\n.prisna-gwt-align-right {\n\ttext-align: right !important;\n}\n\n\n\nbody {\n\ttop: 0 !important;\n}\n.goog-te-banner-frame {\n\tdisplay: none !important;\n\tvisibility: hidden !important;\n}\n\n#goog-gt-tt,\n.goog-tooltip,\n.goog-tooltip:hover {\n\tdisplay: none !important;\n}\n.goog-text-highlight {\n\tbackground-color: transparent !important;\n\tborder: none !important;\n\tbox-shadow: none !important;\n}\n.translated-rtl font,\n.translated-ltr font {\n\tbackground-color: transparent !important;\n\tbox-shadow: none !important;\n\tbox-sizing: border-box !important;\n\t-webkit-box-sizing: border-box !important;\n\t-moz-box-sizing: border-box !important;\n}\n\n-->\n<\/style>\n\n\n\n<div id=\"google_translate_element\" class=\"prisna-gwt-align-left\"><\/div>\n<script type=\"text\/javascript\">\n\/*<![CDATA[*\/\nfunction initializeGoogleTranslateElement() {\n\tnew google.translate.TranslateElement({\n\t\tmultilanguagePage: true,\n\t\tpageLanguage: \"en\",\n\t\tincludedLanguages: \"af,sq,am,ar,hy,az,eu,bn,bs,bg,my,ca,ceb,ny,zh-CN,zh-TW,co,hr,da,nl,en,eo,et,tl,fi,fr,fy,gl,ka,de,el,gu,ht,ha,haw,iw,hi,hmn,hu,is,ig,id,ga,it,ja,jw,kn,kk,km,ko,ku,ky,lo,la,lv,lt,lb,mk,mg,ms,ml,mt,mi,mr,mn,ne,no,ps,fa,pl,pt,pa,ro,sm,gd,sr,st,sn,sd,si,sk,sl,so,es,su,sw,sv,tg,ta,te,th,tr,uk,ur,uz,vi,cy,xh,yi,yo,zu\"\n\t}, \"google_translate_element\");\n}\n\/*]]>*\/\n<\/script>\n<script type=\"text\/javascript\" src=\"\/\/translate.google.com\/translate_a\/element.js?cb=initializeGoogleTranslateElement\"><\/script>\n\n\n\n<p>By&nbsp;Prasanna Abeysekera<\/p>\n\n\n\n<p>An Advanced Persistent Threat (APT) is a prolonged and targeted cyberattack in which an unauthorised person gains access to a network and remains undetected for an extended period. Unlike traditional cyberattacks that aim for a quick score, APTs focus on long-term infiltration, giving attackers time to move around within the network, collect data, and map out the infrastructure before finally exfiltrating sensitive information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is an APT?<\/h2>\n\n\n\n<p>An Advanced Persistent Threat (APT) is a prolonged and targeted cyberattack in which an unauthorised person gains access to a network and remains undetected for an extended period. Unlike traditional cyberattacks that aim for a quick score, APTs focus on long-term infiltration, giving attackers time to move around within the network, collect data, and map out the infrastructure before finally exfiltrating sensitive information.<\/p>\n\n\n\n<p>The frequency and sophistication of cyberattacks are rising in our interconnected world. One of the most dangerous cyber threats is known as Advanced Persistent Threats (APTs). These targeted and prolonged attacks are designed to infiltrate a network, often going undetected, to steal sensitive data or cause severe damage to an organisation. But what exactly are APTs, and how do these cybercriminals conduct their operations? Let's take a closer look at the details.<\/p>\n\n\n\n<p>Due to the complexity and resources required to execute them, APTs are often associated with nation-state actors or highly organised cybercriminal groups. These actors are typically motivated by goals such as corporate espionage, political influence, or even disrupting critical infrastructure.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">The 8 Key Steps of an APT Attack<\/h2>\n\n\n\n<p>To fully understand the threat posed by Advanced Persistent Threats (APTs), it is crucial to comprehend the typical steps involved in an attack:<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Reconnaissance<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Researching and Choosing Targets<\/h3>\n\n\n\n<p>Cybercriminals conduct extensive research to identify potential targets before launching an attack. They gather intelligence about the target's vulnerabilities, personnel, technology stack, and digital footprint, whether a government agency, a multinational corporation, or a key individual. This reconnaissance allows them to tailor their attacks to the organisation's weaknesses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Initial Compromise<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Gaining Entry<\/h3>\n\n\n\n<p>Attackers require a method to gain unauthorised access. They commonly employ advanced phishing tactics or exploit known software vulnerabilities to establish an initial presence within the network. In some cases, attackers utilise zero-day exploits (vulnerabilities the software vendor has not yet identified), allowing them to access the target without detection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Establishing Persistence<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Creating a Backdoor<\/h3>\n\n\n\n<p>After infiltrating the network, attackers set up backdoors or persistent malware to ensure ongoing access. These concealed entry points enable them to re-enter the network even if their initial access is detected and blocked. Additionally, they pilfer credentials, such as passwords, to guarantee continued access to the system beyond just relying on malware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Lateral Movement<\/h2>\n\n\n\n<div class=\"wp-block-cover aligncenter is-repeated wp-duotone-unset-1\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><div role=\"img\" aria-label=\"Lateral Movement\" class=\"wp-block-cover__image-background wp-image-3265 is-repeated\" style=\"background-position:50% 50%;background-image:url(https:\/\/gabey.com.au\/gabeyinfo\/wp-content\/uploads\/2024\/09\/Lateral-Movement.jpg)\"><\/div><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Exploring the Network<\/h3>\n\n\n\n<p>Upon establishing a foothold, the attackers commence network exploration. They identify valuable assets, such as databases or sensitive documents, and endeavour to compromise additional systems by laterally traversing the network. This phase often entails pilfering more credentials and leveraging legitimate user access to evade detection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Data Collection and Exfiltration<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Stealing the Crown Jewels<\/h3>\n\n\n\n<p>Once the attackers identify the sensitive data they seek, they commence the collection process. They meticulously gather the data to avoid detection, whether it involves intellectual property, trade secrets, or classified information. When prepared, they exfiltrate the data through encrypted channels or methods designed to mimic regular network traffic.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Avoiding Detection<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/gabey.com.au\/gabeyinfo\/wp-content\/uploads\/2024\/09\/Staying-Under-the-Radar-edited-300x169.jpg\" alt=\"\" class=\"wp-image-3261\" style=\"width:820px;height:auto\" srcset=\"https:\/\/gabey.com.au\/gabeyinfo\/wp-content\/uploads\/2024\/09\/Staying-Under-the-Radar-edited-300x169.jpg 300w, https:\/\/gabey.com.au\/gabeyinfo\/wp-content\/uploads\/2024\/09\/Staying-Under-the-Radar-edited-600x338.jpg 600w, https:\/\/gabey.com.au\/gabeyinfo\/wp-content\/uploads\/2024\/09\/Staying-Under-the-Radar-edited.jpg 768w\" sizes=\"auto, (max-width: 300px) 85vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">Staying Under the Radar<\/h3>\n\n\n\n<p>APTs' capability to go unnoticed for months or even years is a key characteristic. Attackers employ anti-forensic tactics such as deleting logs or changing timestamps to conceal their activities. They consistently watch the network to prevent detection of their presence, adjusting to changes in security protocols as needed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Achieving Objectives<\/h2>\n\n\n\n<div class=\"wp-block-cover aligncenter is-repeated wp-duotone-unset-2\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-20 has-background-dim\"><\/span><div class=\"wp-block-cover__image-background wp-image-3268 is-repeated\" style=\"background-position:50% 50%;background-image:url(https:\/\/gabey.com.au\/gabeyinfo\/wp-content\/uploads\/2024\/09\/Running-away.jpg)\"><\/div><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Reaching the Endgame<\/h3>\n\n\n\n<p>Advanced Persistent Threats (APTs) are highly focused on achieving their goals. These attackers exhibit unwavering determination, whether stealing property, gathering intelligence for espionage, or disrupting critical infrastructure. They do not stop until their objectives are met, and in some cases, they retain access long after initial goals are accomplished, enabling further exploitation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Exit Strategy<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Retreating or Sticking Around<\/h3>\n\n\n\n<p>APT actors can withdraw and leave no trace after completing their task. However, occasionally, they keep their access open, which lets them come back later to steal more data or conduct more espionage. APTs are particularly hazardous because of this continuous access since they may pose a threat for months or even years.<\/p>\n\n\n\n<p>Once their mission is complete, APT actors may retreat and erase their tracks. However, in some cases, they maintain persistent access, allowing them to return later for further espionage or data theft. This ongoing access makes APTs especially dangerous, as they can remain a lurking threat for months or even years.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Real-world examples of Advanced Persistent Threats (APTs)<\/h2>\n\n\n\n<p>Real-world examples of Advanced Persistent Threats (APTs) have had significant impacts, especially in government and corporate espionage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/spectrum.ieee.org\/the-real-story-of-stuxnet\" target=\"_blank\" rel=\"noreferrer noopener\">Stuxnet (2010)<\/a><\/h3>\n\n\n\n<p>A cyber weapon believed to have been developed by the U.S. and Israel to disrupt Iran's nuclear program. It targeted industrial control systems and was one of the earliest examples of cyber warfare.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/attack.mitre.org\/groups\/G0016\/\" target=\"_blank\" rel=\"noreferrer noopener\">APT29 (Cozy Bear)<\/a><\/h3>\n\n\n\n<p>Allegedly linked to Russian intelligence, this group has carried out high-profile attacks, including the breach of the U.S. Democratic National Committee during the 2016 elections.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/insights.sei.cmu.edu\/blog\/operation-cloud-hopper-case-study\/\" target=\"_blank\" rel=\"noreferrer noopener\">APT10 (Cloud Hopper)<\/a><\/h3>\n\n\n\n<p>Connected to Chinese state-sponsored entities, APT10 engaged in extensive espionage, aiming to obtain sensitive business data from multinational Managed Service Providers (MSPs) in several industries.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Defending Against Advanced Persistent Threats (APTs)<\/h2>\n\n\n\n<p>Due to their stealth and sophistication, advanced persistent threats (APTs) pose challenges in detection and mitigation. However, organisations can take several measures to mitigate their risks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Implementation of Multi-Layered Security<\/h3>\n\n\n\n<p>To prevent and detect APT activities, a combination of firewalls, intrusion detection systems (IDS), endpoint protection, and real-time network monitoring is crucial.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Regular Software Updates<\/h3>\n\n\n\n<p>By ensuring that all software is updated with the latest security patches, you're not just keeping your systems up-to-date, but you're also taking proactive steps to stay in control and ahead of potential APT attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Employee Training<\/h3>\n\n\n\n<p>Regular training programs are a formality and a weapon against APT attacks. By educating your employees in recognising and reporting suspicious emails and other potential threats, you're empowering them with knowledge and making them an integral part of your defence strategy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Behavioural Monitoring<\/h3>\n\n\n\n<p>Leveraging AI-driven systems that can identify unusual activity, such as abnormal login patterns or lateral movement within the network, can serve as indicators of APTs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Zero Trust Architecture<\/h3>\n\n\n\n<p>Embracing a <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-zero-trust-architecture\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust approach<\/a>, where no one inside or outside the network is trusted by default, can hinder attackers' chances of lateral movement.<\/p>\n\n\n\n<p>Advanced Persistent Threats (APTs) epitomise cyberattacks, embodying high organisation, patience, and effectiveness. As APTs advance in sophistication, organisations must proactively fortify their networks and safeguard sensitive data. Understanding the step-by-step methodology of an APT can help identify potential vulnerabilities within security postures and bolster defences against this escalating threat. Vigilance and continuous monitoring are paramount in a world where APTs are an ever-present reality.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">And&nbsp;After&nbsp;That?<\/h2>\n\n\n\n<p>Next, we will explore how to use a powerful tool to effectively detect Advanced Persistent Threats (APTs) and outsmart even the most sophisticated attackers. Be sure to bookmark this page and come back to learn how to strengthen your network against relentless cyber threats!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Acknowledgements<\/h3>\n\n\n\n<p>To gain a deeper understanding of Advanced Persistent Threats (APTs) and cybersecurity, you can explore the following resources:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Books<\/h3>\n\n\n\n<p>Kevin Mitnick's \"<a href=\"https:\/\/www.mitnicksecurity.com\/the-art-of-invisibility-mitnick-security\" target=\"_blank\" rel=\"noreferrer noopener\">The Art of Invisibility<\/a>\" delves into cybersecurity, privacy, and the methods attackers use to remain undetected in systems.<\/p>\n\n\n\n<p>\"<a href=\"https:\/\/www.amazon.com.au\/Advanced-Persistent-Threat-Eric-Cole\/dp\/1597499498?asin=B00AASU4A8&amp;revisionId=ff5cea5c&amp;format=1&amp;depth=1\" target=\"_blank\" rel=\"noreferrer noopener\">APT Incident Response: How to Detect, Investigate, and Respond to Advanced Persistent Threats<\/a>\" by Eric Cole is a guide that explains how to detect and respond to APTs.<\/p>\n\n\n\n<p>\"<a href=\"https:\/\/www.amazon.com.au\/Cybersecurity-Cyberwar-What-Everyone-Needs\/dp\/0199918112?asin=B00GJG6ZB2&amp;revisionId=f3eb06c7&amp;format=1&amp;depth=1\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity and Cyberwar: What Everyone Needs to Know<\/a>\" by P.W. Singer and Allan Friedman provides a comprehensive overview of cybersecurity threats and defences, including APTs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Online Courses<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/attack.mitre.org\/resources\/learn-more-about-attack\/training\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE ATT&amp;CK Framework Training<\/a><\/h4>\n\n\n\n<p>This comprehensive resource details various tactics, techniques, and procedures (TTPs) used by APTs.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">SANS Institute Cybersecurity<\/h4>\n\n\n\n<p><a href=\"https:\/\/www.sans.org\/au_en\/\" target=\"_blank\" rel=\"noreferrer noopener\">SANS Institute Cybersecurity Training<\/a> offers courses in incident response, penetration testing, and more, including in-depth APT-related modules.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Coursera's Cybersecurity<\/h4>\n\n\n\n<p><a href=\"https:\/\/www.coursera.org\/courses?query=cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">Coursera's Cybersecurity Specialisation<\/a> is a fantastic starting point for beginners to learn cybersecurity. It covers threat analysis and defence mechanisms.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Research Papers and Whitepapers<\/h4>\n\n\n\n<p>\"<a href=\"https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html\" target=\"_blank\" rel=\"noreferrer noopener\">The Cyber Kill Chain\" by Lockheed Martin<\/a>: This framework details how cyberattacks unfold and provides insights into APT methodology.<\/p>\n\n\n\n<p>\"<a href=\"https:\/\/inria.hal.science\/hal-01404186\/document\" target=\"_blank\" rel=\"noreferrer noopener\">Advanced Persistent Threats: A Symantec Perspective<\/a>\": This whitepaper explores common APT strategies and defences.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.mandiant.com\/resources\/reports\" target=\"_blank\" rel=\"noreferrer noopener\">FireEye's Annual Mandiant Threat Report<\/a> provides analysis and insights on the latest APT activities across the globe.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Government and Industry Resources<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noreferrer noopener\">The National Institute of Standards and Technology (NIST) Cybersecurity Framework<\/a> provides guidelines for enhancing cybersecurity defences, including APT prevention.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cyber.gov.au\/about-us\/view-all-content\/reports-and-statistics\/asd-cyber-threat-report-july-2022-june-2023\" target=\"_blank\" rel=\"noreferrer noopener\">The Australian Cyber Security Centre (ACSC)<\/a> publishes detailed reports on APTs and other threats and practical mitigation advice.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.usa.gov\/agencies\/cybersecurity-and-infrastructure-security-agency\" target=\"_blank\" rel=\"noreferrer noopener\">The U.S. Cybersecurity and Infrastructure Security Agency (CISA)<\/a> offers timely threat alerts, advisories, and reports related to APTs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cybersecurity Blogs and Websites<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Krebs on Security<\/h4>\n\n\n\n<p>This is a prominent blog by cybersecurity expert <a href=\"https:\/\/krebsonsecurity.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Brian Krebs<\/a>, which covers the latest information on APTs and high-profile attacks.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dark Reading<\/a><\/h4>\n\n\n\n<p>This cybersecurity news and research website frequently covers APTs and advanced threats.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/threatpost.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threatpost<\/a><\/h4>\n\n\n\n<p>This platform offers news and analysis of the latest cybersecurity threats, including APT activities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Podcasts<\/h3>\n\n\n\n<p>Here are a few podcast recommendations related to cybersecurity:<\/p>\n\n\n\n<p>\"<a href=\"https:\/\/darknetdiaries.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Darknet Diaries<\/a>\": This series tells true stories from the dark side of the internet, including episodes on APT attacks.<br>\"<a href=\"https:\/\/thecyberwire.com\/podcasts\/hacking-humans\" target=\"_blank\" rel=\"noreferrer noopener\">Hacking Humans<\/a>\" by CyberWire: Focuses on social engineering, a common technique used in APT attacks.<br>\"<a href=\"https:\/\/www.grc.com\/securitynow.htm\" target=\"_blank\" rel=\"noreferrer noopener\">Security Now<\/a>!\": Hosted by Steve Gibson, this podcast delves into security vulnerabilities and cyber defence strategies.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"https:\/\/www.gabey.com.au\/mail\/com456.php\" target=\"_blank\" rel=\"noreferrer noopener\">Suggest a Correction\/Comment<\/a><\/div>\n<\/div>\n\n\n\n<p><a href=\"https:\/\/gabey.com.au\/Legal-Disclaimer.html\" data-type=\"link\" data-id=\"https:\/\/gabey.com.au\/Legal-Disclaimer.html\" target=\"_blank\" rel=\"noreferrer noopener\">Legal Disclaimer<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By&nbsp;Prasanna Abeysekera An Advanced Persistent Threat (APT) is a prolonged and targeted cyberattack in which an unauthorised person gains access to a network and remains undetected for an extended period. Unlike traditional cyberattacks that aim for a quick score, APTs focus on long-term infiltration, giving attackers time to move around within the network, collect data, &hellip; <a href=\"https:\/\/gabey.com.au\/gabeyinfo\/index.php\/2024\/09\/13\/unveiling-the-threat-how-advanced-persistent-threats-apts-persist-as-stealthy-cyber-attacks\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Unveiling the Threat: How Advanced Persistent Threats (APTs) Persist as Stealthy Cyber Attacks&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":3249,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[88],"tags":[],"class_list":["post-3246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protecting-from-cyber-threats"],"_links":{"self":[{"href":"https:\/\/gabey.com.au\/gabeyinfo\/index.php\/wp-json\/wp\/v2\/posts\/3246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gabey.com.au\/gabeyinfo\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gabey.com.au\/gabeyinfo\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gabey.com.au\/gabeyinfo\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gabey.com.au\/gabeyinfo\/index.php\/wp-json\/wp\/v2\/comments?post=3246"}],"version-history":[{"count":0,"href":"https:\/\/gabey.com.au\/gabeyinfo\/index.php\/wp-json\/wp\/v2\/posts\/3246\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gabey.com.au\/gabeyinfo\/index.php\/wp-json\/wp\/v2\/media\/3249"}],"wp:attachment":[{"href":"https:\/\/gabey.com.au\/gabeyinfo\/index.php\/wp-json\/wp\/v2\/media?parent=3246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gabey.com.au\/gabeyinfo\/index.php\/wp-json\/wp\/v2\/categories?post=3246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gabey.com.au\/gabeyinfo\/index.php\/wp-json\/wp\/v2\/tags?post=3246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}