{"id":524,"date":"2022-08-21T21:43:26","date_gmt":"2022-08-21T21:43:26","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=524"},"modified":"2022-08-21T21:43:26","modified_gmt":"2022-08-21T21:43:26","slug":"apt-amenintare-persistenta-avansata","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/amenintari-cibernetice\/apt-amenintare-persistenta-avansata\/","title":{"rendered":"APT (amenin\u021bare persistent\u0103 avansat\u0103)"},"content":{"rendered":"<p>Un atac APT este un tip de atac cibernetic realizat de un atacator motivat \u0219i bine resursat, care \u00ee\u0219i propune s\u0103 ob\u021bin\u0103 acces pe termen lung la re\u021beaua unei \u021binte. Atacul este realizat \u00een mai multe etape:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Colectarea de informa\u021bii: Atacatorul APT colecteaz\u0103 informa\u021bii despre re\u021beaua \u021bint\u0103, adesea prin e-mailuri de phishing, ata\u0219amente malware \u0219i vulnerabilit\u0103\u021bi software.<\/li>\n\n\n\n<li>Punct de intrare: Atacatorul g\u0103se\u0219te o modalitate de a intra \u00een sistem pentru a instala malware, folosind tehnici precum e-mailuri de phishing sau exploatarea vulnerabilit\u0103\u021bilor software.<\/li>\n\n\n\n<li>Server de comand\u0103 \u0219i control: Atacatorul stabile\u0219te un canal de comunicare cu malware-ul, de obicei printr-o adres\u0103 IP situat\u0103 \u00eentr-o alt\u0103 \u021bar\u0103.<\/li>\n\n\n\n<li>Mi\u0219care lateral\u0103: Atacatorul ob\u021bine acces la mai multe ma\u0219ini din re\u021bea exploat\u00e2nd vulnerabilit\u0103\u021bile software \u0219i folosind acredit\u0103ri furate.<\/li>\n\n\n\n<li>Transfer de date: Atacatorul fur\u0103 date prin exfiltrarea lor, de obicei comprim\u00e2ndu-le \u0219i cript\u00e2ndu-le pentru a evita detectarea.<\/li>\n\n\n\n<li>Acoperire: Atacatorul \u00ee\u0219i ascunde urmele, \u0219terg\u00e2nd fi\u0219iere, dezactiv\u00e2nd logarea sau folosind alte mijloace pentru a face atacul greu de detectat.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"771\" height=\"540\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-APT-1.jpg\" alt=\"Amenin\u021bare persistent\u0103 avansat\u0103 (APT)\" class=\"wp-image-531\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-APT-1.jpg 771w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-APT-1-300x210.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-APT-1-768x538.jpg 768w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\" \/><\/figure>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-execute-adequate-security-against-the-advanced-threats\"><strong>Cum s\u0103 executa\u021bi o securitate adecvat\u0103 \u00eempotriva amenin\u021b\u0103rilor avansate<\/strong><\/h2>\n\n\n<p>Am ajuns la un punct de cotitur\u0103 \u00een securitate c\u00e2nd organiza\u021biile trebuie s\u0103 accepte c\u0103 vor fi hackuite. Este, de asemenea, corect s\u0103 presupunem c\u0103 orice sistem critic conectat la o re\u021bea \u0219i apoi expus la Internet a fost deja compromis.<\/p>\n\n\n\n<p>Nu exist\u0103 garan\u021bii c\u0103 vreo organiza\u021bie este liber\u0103 de amenin\u021bare. Este potrivit ca o organiza\u021bie s\u0103 spere c\u0103 nu va fi hackuit\u0103, dar are sens s\u0103 aib\u0103 m\u0103suri de detectare \u00een vigoare, doar \u00een caz. \u0218i c\u00e2nd apare o bre\u0219\u0103, aceasta poate fi detectat\u0103 c\u00e2t mai cur\u00e2nd posibil.<\/p>\n\n\n\n<p>Este crucial s\u0103 g\u0103si\u021bi problema rapid pentru a nu se \u00eent\u00e2mpla din nou.<\/p>\n\n\n\n<p>Prioritatea noastr\u0103 principal\u0103 este s\u0103 men\u021binem compania pe linia de plutire, iar cea mai bun\u0103 modalitate de a face acest lucru este prin detectarea timpurie a bre\u0219elor de date \u0219i reac\u021bionarea rapid\u0103 pentru a minimiza daunele. Din p\u0103cate, evenimentele recente au ar\u0103tat c\u0103 companiile trebuie s\u0103 fac\u0103 mai mult pentru a vedea aceste compromisuri.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"understanding-the-risks\"><strong>\u00cen\u021belegerea riscurilor<\/strong><\/h3>\n\n\n<p>Afacerile ar trebui s\u0103 men\u021bin\u0103 acela\u0219i nivel de precau\u021bie \u00een ceea ce prive\u0219te securitatea, a\u0219a cum facem \u00een via\u021ba de zi cu zi. Ai m\u00e2nca o ciocolat\u0103 de pe jos, din care altcineva a mu\u0219cat deja? Desigur c\u0103 nu! \u00cen acela\u0219i mod, afacerile nu ar trebui s\u0103 \u00ee\u0219i asume riscuri inutile acolo unde nu \u0219tiu ce s-ar putea \u00eent\u00e2mpla sau cum ar putea ajunge lucrurile.<\/p>\n\n\n\n<p>Din p\u0103cate, c\u00e2nd vine vorba de securitatea cibernetic\u0103, acelea\u0219i concepte de bun sim\u021b nu au fost \u00eenc\u0103 insuflate. Este la fel de riscant s\u0103 ridici \u0219i s\u0103 folose\u0219ti un stick USB l\u0103sat pe jos ca \u0219i cum ai m\u00e2nca m\u00e2ncare de pe podea. Cu toate acestea, majoritatea oamenilor nu au fost \u00eenv\u0103\u021ba\u021bi s\u0103 nu fac\u0103 acest lucru \u00eenc\u0103 din copil\u0103rie. \u0218i este esen\u021bial s\u0103 educ\u0103m oamenii despre pericolele din lumea digital\u0103.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"focus-on-the-organizations-vulnerabilities\"><strong>Concentra\u021bi-v\u0103 pe vulnerabilit\u0103\u021bile organiza\u021biei<\/strong><\/h3>\n\n\n<p>Ne concentr\u0103m \u00een mod natural pe acele amenin\u021b\u0103ri care au cea mai bun\u0103 \u0219ans\u0103 de a fi exploatate \u0219i de a provoca un impact semnificativ. Zece vulnerabilit\u0103\u021bi majore sunt mai u\u0219or de remediat dec\u00e2t 100 minore. \u00cen loc s\u0103 \u00eembun\u0103t\u0103\u021beasc\u0103 o expunere la un moment dat p\u00e2n\u0103 c\u00e2nd dispare, multe organiza\u021bii fac aceast\u0103 gre\u0219eal\u0103 \u0219i se concentreaz\u0103 excesiv pe repararea uneia p\u00e2n\u0103 c\u00e2nd este rezolvat\u0103, \u00een loc s\u0103 reduc\u0103 multe riscuri simultan.<\/p>\n\n\n\n<p>Aceast\u0103 viziune mioap\u0103 creeaz\u0103 un fals sentiment de securitate \u0219i le d\u0103 impresia CISO-urilor c\u0103 \u00ee\u0219i fac treaba c\u00e2nd, \u00een realitate, fac doar \u00eembun\u0103t\u0103\u021biri marginale.<\/p>\n\n\n\n<p>\u00cen plus, c\u00e2nd securitatea unei organiza\u021bii este compromis\u0103, nu este doar slujba CISO-ului \u00een pericol. Reputa\u021bia \u00eentregii companii este \u00een joc. A\u0219adar, toat\u0103 lumea din organiza\u021bie trebuie s\u0103 fie la curent cu cele mai recente amenin\u021b\u0103ri de securitate.<\/p>\n\n\n\n<p>\u0218i, \u00een final, chiar dac\u0103 o companie are asigurare de securitate cibernetic\u0103, aceasta nu este suficient\u0103. Costul mediu al unei bre\u0219e de date este de 3,86 milioane de dolari, \u0219i acesta este doar media! Costul total ar putea fi mult mai mare, \u00een func\u021bie de dimensiunea companiei \u0219i de tipul de date furate.<\/p>\n\n\n\n<p>Asigurarea de securitate cibernetic\u0103 acoper\u0103 doar o frac\u021biune din costul total \u0219i nu contribuie la \u00eembun\u0103t\u0103\u021birea posturii de securitate a companiei. A\u0219adar, chiar dac\u0103 o companie are asigurare, este \u00een interesul s\u0103u s\u0103 fac\u0103 tot ce poate pentru a preveni o bre\u0219\u0103 de la bun \u00eenceput.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"reduce-attack-surface\"><strong>Reduce\u021bi suprafa\u021ba de atac<\/strong><\/h3>\n\n\n<p>Una dintre zonele critice pentru prevenirea amenin\u021b\u0103rilor APT este reducerea suprafe\u021bei de atac sau eliminarea componentelor suplimentare care nu sunt utilizate. Procedurile de \u00eent\u0103rire rezonabile \u0219i managementul solid al configura\u021biei sunt cheia succesului.<\/p>\n\n\n\n<p>Porturile deschise \u0219i scripturile pot face o organiza\u021bie vulnerabil\u0103 la bre\u0219e de securitate. Dac\u0103 aceste servicii sunt hackuite, consecin\u021bele ar putea fi dezastruoase. Cu toate acestea, dac\u0103 o organiza\u021bie folose\u0219te servicii nu pentru scopuri legitime \u0219i acele servicii sunt compromise, ave\u021bi tot dreptul s\u0103 fi\u021bi \u00eengrijorat.<\/p>\n\n\n\n<p>Multe atacuri APT de succes au profitat de capacit\u0103\u021bi activate, dar care nu sunt utilizate \u00een scopuri practice.<\/p>\n\n\n\n<p>Organiza\u021biile \u00ee\u0219i pot \u00eembun\u0103t\u0103\u021bi securitatea reduc\u00e2nd num\u0103rul de caracteristici software, aplica\u021bii \u0219i sisteme. Mai pu\u021bine caracteristici \u00eenseamn\u0103 mai pu\u021bine oportunit\u0103\u021bi pentru atacatori de a g\u0103si o cale de intrare.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"be-aware-of-htmlembedded-email-content\"><strong>Fi\u021bi con\u0219tien\u021bi de con\u021binutul de e-mail \u00eencorporat \u00een HTML<\/strong><\/h3>\n\n\n<p>Organiza\u021biile care folosesc con\u021binut \u00eencorporat \u00een HTML \u00een e-mailurile lor sunt mai susceptibile la atacuri de tip spear phishing de la APT-uri. \u00cen timp ce unii oameni folosesc caracteristicile HTML \u00eentr-un e-mail pentru a se juca cu culori \u0219i fundaluri sau pentru a \u00eencorpora con\u021binut, majoritatea afacerilor nu necesit\u0103 HTML pentru opera\u021biunile lor zilnice.<\/p>\n\n\n\n<p>Uneori oamenii v\u0103 trimit e-mailuri cu linkuri \u00een ele. Oamenii ar putea face clic pe link, crez\u00e2nd c\u0103 \u00eei va duce unde doresc s\u0103 mearg\u0103. Dar infractorii cibernetici au g\u0103sit o modalitate de a ascunde destina\u021bia real\u0103 \u00een codul e-mailului.&nbsp;<\/p>\n\n\n\n<p>Dac\u0103 organiza\u021biile ar dezactiva e-mailurile HTML, ar opri multe atacuri de tip spear phishing.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"raise-awareness-of-users\"><strong>Cre\u0219te\u021bi con\u0219tientizarea utilizatorilor<\/strong><\/h3>\n\n\n<p>Multe pericole intr\u0103 \u00eentr-o re\u021bea prin mijloace frauduloase, cum ar fi atragerea utilizatorului s\u0103 deschid\u0103 un ata\u0219ament sau s\u0103 fac\u0103 clic pe un link pe care nu ar trebui. Sesiunile pot contribui mult la reducerea expunerii generale prin restric\u021bionarea ac\u021biunilor pe care un utilizator le poate efectua cu o con\u0219tientizare adecvat\u0103.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"conduct-behavior-ranking\"><strong>Efectua\u021bi clasificarea comportamentului<\/strong><\/h3>\n\n\n<p>Adesea, atacatorii sofistica\u021bi folosesc tactici standard pentru a determina dac\u0103 ceva este sigur. De\u0219i aceast\u0103 metod\u0103 nu este foarte fiabil\u0103, este \u00eenc\u0103 folosit\u0103 pe scar\u0103 larg\u0103 de nenum\u0103ra\u021bi atacatori.<\/p>\n\n\n\n<p>Atacatorii doresc s\u0103 r\u0103m\u00e2n\u0103 nedetecta\u021bi, a\u0219a c\u0103 trebuie s\u0103 fi\u021bi aten\u021bi la ac\u021biunile lor. Mul\u021bi atacatori \u00eencearc\u0103 s\u0103 par\u0103 trafic obi\u0219nuit. Fac acest lucru pentru a putea trece de securitate f\u0103r\u0103 a fi observa\u021bi. Dar odat\u0103 ce sunt \u00een\u0103untru, \u00ee\u0219i arat\u0103 adev\u0103ratele inten\u021bii. A\u0219adar, trebuie s\u0103 fi\u021bi aten\u021bi la anumite tipuri de comportament \u0219i s\u0103 determina\u021bi dac\u0103 arat\u0103 mai mult ca un utilizator obi\u0219nuit sau cineva cu inten\u021bii rele.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"create-a-sandboxing-environment\"><strong>Crea\u021bi un mediu de sandboxing<\/strong><\/h3>\n\n\n<p>Un sandbox este un mediu de testare izolat care permite utilizatorilor s\u0103 ruleze programe sau s\u0103 execute fi\u0219iere f\u0103r\u0103 a afecta restul sistemului.<\/p>\n\n\n\n<p>Un mediu de afaceri tipic are mul\u021bi utilizatori care au nevoie de acces la diferite aplica\u021bii \u0219i date. Cu toate acestea, nu to\u021bi utilizatorii necesit\u0103 acces la toate aplica\u021biile \u0219i datele. Majoritatea utilizatorilor au nevoie doar de acces la un subset mic de aplica\u021bii \u0219i date.<\/p>\n\n\n\n<p>Prin crearea unui mediu de sandbox, afacerile pot limita cantitatea de date \u0219i aplica\u021bii la care utilizatorii pot avea acces. Un sandbox va minimiza \u0219ansele unei bre\u0219e de date \u0219i va reduce impactul dac\u0103 apare o bre\u0219\u0103.<\/p>\n\n\n\n<p>\u00cen plus, sandboxing-ul poate ajuta, de asemenea, la prevenirea r\u0103sp\u00e2ndirii malware-ului. Dac\u0103 un utilizator deschide un fi\u0219ier care con\u021bine malware, malware-ul va fi izolat \u00een sandbox \u0219i nu va putea infecta restul sistemului.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"implement-least-privilege\"><strong>Implementa\u021bi principiul privilegiului minim<\/strong><\/h3>\n\n\n<p>Privilegiul minim este un principiu de securitate care afirm\u0103 c\u0103 utilizatorilor ar trebui s\u0103 li se acorde doar nivelul minim de acces necesar pentru a-\u0219i \u00eendeplini sarcina.<\/p>\n\n\n\n<p>De exemplu, utilizatorii ar trebui s\u0103 aib\u0103 acces de editare doar dac\u0103 citesc date dintr-o baz\u0103 de date. Prin restric\u021bionarea utilizatorilor la nivelul minim necesar de acces, afacerile pot reduce \u0219ansele unei bre\u0219e de date.<\/p>\n\n\n\n<p>\u00cen plus, afacerile ar trebui s\u0103 ia \u00een considerare \u0219i implementarea principiului privilegiului minim pentru aplica\u021bii. Dac\u0103 o aplica\u021bie are nevoie doar s\u0103 citeasc\u0103 date dintr-o baz\u0103 de date, nu ar trebui s\u0103 i se acorde acces de scriere. Prin restric\u021bionarea aplica\u021biilor la nivelul minim necesar de acces, afacerile pot reduce \u0219i mai mult \u0219ansele unei bre\u0219e de date.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"secure-the-networks-outbound-traffic\"><strong>Securiza\u021bi traficul de ie\u0219ire al re\u021belei<\/strong><\/h3>\n\n\n<p>Deoarece traficul de ie\u0219ire este mai probabil s\u0103 con\u021bin\u0103 date furate dintr-o re\u021bea, monitorizarea acestuia este \u0219i mai critic\u0103. Prin analizarea traficului de ie\u0219ire, pute\u021bi identifica orice activitate neobi\u0219nuit\u0103 \u0219i lua m\u0103suri pentru a preveni ca compania dumneavoastr\u0103 s\u0103 fie afectat\u0103.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"understand-how-the-offence-operates\"><strong>\u00cen\u021belege\u021bi cum opereaz\u0103 ofensiva<\/strong><\/h3>\n\n\n<p>Pentru a v\u0103 proteja organiza\u021bia de atacurile APT, trebuie s\u0103 \u00een\u021belege\u021bi cum func\u021bioneaz\u0103 atacurile. De asemenea, trebuie s\u0103 fi\u021bi la curent cu cele mai recente metode de atac pentru a v\u0103 preg\u0103ti ap\u0103rarea.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"control-the-endpoint\"><strong>Controla\u021bi punctul final<\/strong><\/h3>\n\n\n<p>Atacatorii pot folosi un punct final pentru a intra \u00eentr-o re\u021bea, dar obiectivul lor principal este, de obicei, s\u0103 fure date. Dac\u0103 dori\u021bi s\u0103 v\u0103 proteja\u021bi datele \u0219i s\u0103 minimiza\u021bi impactul unui atac, <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/feature\/Endpoint-security-strategy-Focus-on-endpoints-apps-or-both\" target=\"_blank\" rel=\"noreferrer noopener\">concentra\u021bi-v\u0103 pe securizarea \u0219i monitorizarea punctului final.<\/a><\/p>\n\n\n\n<p>Organiza\u021biile pot folosi multe tehnici diferite pentru a controla punctul final. O metod\u0103 standard este s\u0103 solicita\u021bi autentificare cu doi factori (TFA) pentru to\u021bi utilizatorii. TFA asigur\u0103 c\u0103 doar utilizatorii autoriza\u021bi pot accesa datele.<\/p>\n\n\n\n<p>O alt\u0103 metod\u0103 este utilizarea listei albe de aplica\u021bii. Aceast\u0103 tehnic\u0103 permite doar aplica\u021biilor aprobate s\u0103 ruleze pe un punct final. Prin controlul aplica\u021biilor permise s\u0103 ruleze, pute\u021bi reduce riscul unui atac.<\/p>\n\n\n\n<p>De asemenea, pute\u021bi folosi instrumente de monitorizare pentru a controla punctul final. Aceste instrumente v\u0103 pot ajuta s\u0103 detecta\u021bi \u0219i s\u0103 r\u0103spunde\u021bi la activit\u0103\u021bi suspecte.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"implement-a-data-classification-system\"><strong>Implementa\u021bi un sistem de clasificare a datelor<\/strong><\/h3>\n\n\n<p>Trebuie s\u0103 ave\u021bi o procedur\u0103 adecvat\u0103 de clasificare a datelor pentru a v\u0103 proteja compania de APT-uri. Un sistem de <a href=\"https:\/\/www.sciencelearn.org.nz\/resources\/1438-classification-system\" target=\"_blank\" rel=\"noreferrer noopener\">clasificare a datelor<\/a> \u00eenseamn\u0103 s\u0103 \u0219ti\u021bi care informa\u021bii sunt suficient de sensibile pentru a necesita protec\u021bie. Una dintre problemele cu APT-urile este c\u0103 \u00eencearc\u0103 constant s\u0103 fure date din organiza\u021bia dumneavoastr\u0103. Nu pute\u021bi opri totul s\u0103 p\u0103r\u0103seasc\u0103 compania, dar av\u00e2nd o procedur\u0103 adecvat\u0103 de clasificare a datelor v\u0103 va ajuta s\u0103 v\u0103 ap\u0103ra\u021bi \u00eempotriva acestor atacuri.<\/p>\n\n\n\n<p>Cea mai bun\u0103 modalitate de a stoca datele este pe o re\u021bea de stocare bazat\u0103 pe Internet. Aceast\u0103 re\u021bea de stocare este foarte sigur\u0103 \u0219i va ajuta la p\u0103strarea datelor \u00een siguran\u021b\u0103. De asemenea, este important s\u0103 permite\u021bi doar informa\u021biilor necesare s\u0103 p\u0103r\u0103seasc\u0103 compania, astfel \u00eenc\u00e2t datele sensibile s\u0103 r\u0103m\u00e2n\u0103 intacte.<\/p>\n\n\n\n<p>Dac\u0103 ave\u021bi dou\u0103 fi\u0219iere, unul de cuno\u0219tin\u021be publice \u0219i cel\u0103lalt confiden\u021bial, fi\u0219ierul confiden\u021bial este expus unui risc mai mare, deoarece oamenii ar putea s\u0103 nu \u0219tie c\u0103 este secret. O organiza\u021bie poate acum s\u0103 reglementeze \u0219i s\u0103 gestioneze fluxul de informa\u021bii cu o solu\u021bie de prevenire a pierderii de date (DLP) care este str\u00e2ns legat\u0103 de gestionarea drepturilor digitale (DRM).<\/p>\n\n\n\n<p>Exist\u0103 mai mul\u021bi pa\u0219i \u00eentr-o procedur\u0103 adecvat\u0103 de clasificare a datelor:<\/p>\n\n\n\n<p>1. Determina\u021bi administratorul<\/p>\n\n\n\n<p>2. Specifica\u021bi tipurile de date<\/p>\n\n\n\n<p>3. Categoriza\u021bi datele<\/p>\n\n\n\n<p>4. Stabili\u021bi controale de securitate<\/p>\n\n\n\n<p>5. Instrui\u021bi angaja\u021bii cu privire la procedur\u0103<\/p>\n\n\n\n<p>6. Monitoriza\u021bi \u0219i revizui\u021bi procedura<\/p>\n\n\n\n<p>3. Determina\u021bi valoarea datelor<\/p>\n\n\n\n<p>4. Clasifica\u021bi datele<\/p>\n\n\n\n<p>5. Crea\u021bi o politic\u0103<\/p>\n\n\n\n<p>6. Instrui\u021bi angaja\u021bii<\/p>\n\n\n\n<p>7. Impune\u021bi politica<\/p>\n\n\n\n<p>8. Monitoriza\u021bi conformitatea<\/p>\n\n\n\n<p>O procedur\u0103 de clasificare a datelor este o parte esen\u021bial\u0103 a oric\u0103rui plan de securitate. Prin implementarea unei proceduri de clasificare, pute\u021bi ajuta la protejarea companiei de APT-uri.<\/p>\n\n\n\n<p>Securitatea cibernetic\u0103 este crucial\u0103. Organiza\u021biile vor continua s\u0103 fie hackuite, dar noi \u00eenc\u0103 lupt\u0103m.&nbsp;<\/p>\n\n\n\n<p>Nu putem opri \u00eentotdeauna fiecare atac, dar fiind preg\u0103ti\u021bi \u0219i vigilen\u021bi, putem limita daunele pe care hackerii le pot face.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Un atac APT este un tip de atac cibernetic efectuat de un atacator motivat \u0219i cu resurse suficiente, care urm\u0103re\u0219te s\u0103 ob\u021bin\u0103 acces pe termen lung la re\u021beaua unei \u021binte. Atacul este efectuat... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/amenintari-cibernetice\/apt-amenintare-persistenta-avansata\/\">Continue reading <span class=\"screen-reader-text\">APT (amenin\u021bare persistent\u0103 avansat\u0103)<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":635,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APT (Advanced Persistent Threat) | Security Briefing<\/title>\n<meta name=\"description\" content=\"An overview of APTs, what they are and how they work. Learn why companies continue to be vulnerable to them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/amenintari-cibernetice\/apt-amenintare-persistenta-avansata\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT (Advanced Persistent Threat) | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"An overview of APTs, what they are and how they work. Learn why companies continue to be vulnerable to them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/amenintari-cibernetice\/apt-amenintare-persistenta-avansata\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-21T21:43:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"APT (Advanced Persistent Threat)\",\"datePublished\":\"2022-08-21T21:43:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\"},\"wordCount\":1827,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\",\"articleSection\":[\"Cyber Threats\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\",\"name\":\"APT (Advanced Persistent Threat) | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\",\"datePublished\":\"2022-08-21T21:43:26+00:00\",\"description\":\"An overview of APTs, what they are and how they work. Learn why companies continue to be vulnerable to them.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\",\"width\":558,\"height\":500,\"caption\":\"APT banner\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT (Advanced Persistent Threat)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"APT (Amenin\u021bare Persistent\u0103 Avansat\u0103) | Informare de Securitate","description":"O prezentare general\u0103 a APT-urilor, ce sunt acestea \u0219i cum func\u021bioneaz\u0103. Afla\u021bi de ce companiile continu\u0103 s\u0103 fie vulnerabile \u00een fa\u021ba lor.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/amenintari-cibernetice\/apt-amenintare-persistenta-avansata\/","og_locale":"ro_RO","og_type":"article","og_title":"APT (Advanced Persistent Threat) | Security Briefing","og_description":"An overview of APTs, what they are and how they work. Learn why companies continue to be vulnerable to them.","og_url":"https:\/\/securitybriefing.net\/ro\/amenintari-cibernetice\/apt-amenintare-persistenta-avansata\/","og_site_name":"Security Briefing","article_published_time":"2022-08-21T21:43:26+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"C\u00e9sar Daniel Barreto","Timp estimat pentru citire":"9 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"APT (Advanced Persistent Threat)","datePublished":"2022-08-21T21:43:26+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/"},"wordCount":1827,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","articleSection":["Cyber Threats"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/","name":"APT (Amenin\u021bare Persistent\u0103 Avansat\u0103) | Informare de Securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","datePublished":"2022-08-21T21:43:26+00:00","description":"O prezentare general\u0103 a APT-urilor, ce sunt acestea \u0219i cum func\u021bioneaz\u0103. Afla\u021bi de ce companiile continu\u0103 s\u0103 fie vulnerabile \u00een fa\u021ba lor.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","width":558,"height":500,"caption":"APT banner"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"APT (Advanced Persistent Threat)"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto este un apreciat scriitor \u0219i expert \u00een securitate cibernetic\u0103, cunoscut pentru cuno\u0219tin\u021bele sale aprofundate \u0219i capacitatea de a simplifica subiecte complexe de securitate cibernetic\u0103. Cu o vast\u0103 experien\u021b\u0103 \u00een securitatea re\u021belelor \u0219i protec\u021bia datelor, el contribuie \u00een mod regulat cu articole \u0219i analize p\u0103trunz\u0103toare privind cele mai recente tendin\u021be \u00een materie de securitate cibernetic\u0103, educ\u00e2nd at\u00e2t profesioni\u0219tii, c\u00e2t \u0219i publicul.","url":"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=524"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/524\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/635"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}