{"id":524,"date":"2022-08-21T21:43:26","date_gmt":"2022-08-21T21:43:26","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=524"},"modified":"2022-08-21T21:43:26","modified_gmt":"2022-08-21T21:43:26","slug":"apt-avancerat-bestaende-hot","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/cyberhot\/apt-avancerat-bestaende-hot\/","title":{"rendered":"APT (avancerat ih\u00e5llande hot)"},"content":{"rendered":"<p>An APT attack is a type of cyberattack carried out by a motivated and well-resourced attacker, who aims to gain long-term access to a target\u2019s network. The attack is carried out in several stages:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Informationsinsamling: APT-angriparen samlar in information om m\u00e5ln\u00e4tverket, ofta genom n\u00e4tfiske-e-post, skadeprogramsbilagor och mjukvarus\u00e5rbarheter.<\/li>\n\n\n\n<li>Intr\u00e4despunkt: Angriparen hittar ett s\u00e4tt att komma in i systemet f\u00f6r att installera skadeprogram, med hj\u00e4lp av tekniker som n\u00e4tfiske-e-post eller utnyttjande av mjukvarus\u00e5rbarheter.<\/li>\n\n\n\n<li>Kommando- och kontrollserver: Angriparen uppr\u00e4ttar en kommunikationskanal med skadeprogrammet, vanligtvis genom en IP-adress bel\u00e4gen i ett annat land.<\/li>\n\n\n\n<li>Lateral r\u00f6relse: Angriparen f\u00e5r tillg\u00e5ng till flera maskiner i n\u00e4tverket genom att utnyttja mjukvarus\u00e5rbarheter och anv\u00e4nda stulna inloggningsuppgifter.<\/li>\n\n\n\n<li>Data\u00f6verf\u00f6ring: Angriparen stj\u00e4l data genom att exfiltrera den, vanligtvis genom att komprimera och kryptera den f\u00f6r att undvika uppt\u00e4ckt.<\/li>\n\n\n\n<li>T\u00e4cka sp\u00e5ren: Angriparen d\u00f6ljer sina sp\u00e5r, raderar filer, inaktiverar loggning eller anv\u00e4nder andra metoder f\u00f6r att g\u00f6ra attacken sv\u00e5r att uppt\u00e4cka.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"771\" height=\"540\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-APT-1.jpg\" alt=\"Avancerat ih\u00e5llande hot (APT)\" class=\"wp-image-531\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-APT-1.jpg 771w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-APT-1-300x210.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-APT-1-768x538.jpg 768w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\" \/><\/figure>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-execute-adequate-security-against-the-advanced-threats\"><strong>Hur man genomf\u00f6r adekvat s\u00e4kerhet mot avancerade hot<\/strong><\/h2>\n\n\n<p>We\u2019ve come to a turning point in security when organizations must accept that they will be hacked. It\u2019s also fair to suppose that any critical systems linked to a network and then exposed to the Internet have already been compromised.<\/p>\n\n\n\n<p>There are no assurances that any organization is free from the threat. It\u2019s suitable for an organization to hope they won\u2019t be hacked, but it makes sense to have detection precautions in place just in case. And when a breach occurs, it can be detected as soon as possible.<\/p>\n\n\n\n<p>Det \u00e4r avg\u00f6rande att snabbt hitta problemet s\u00e5 att det inte h\u00e4nder igen.<\/p>\n\n\n\n<p>V\u00e5r h\u00f6gsta prioritet \u00e4r att h\u00e5lla v\u00e5rt f\u00f6retag flytande, och det b\u00e4sta s\u00e4ttet att g\u00f6ra det \u00e4r genom att uppt\u00e4cka dataintr\u00e5ng tidigt och reagera snabbt f\u00f6r att minimera skadan. Tyv\u00e4rr har de senaste h\u00e4ndelserna visat att f\u00f6retag beh\u00f6ver g\u00f6ra mer f\u00f6r att se dessa kompromisser.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"understanding-the-risks\"><strong>F\u00f6rst\u00e5 riskerna<\/strong><\/h3>\n\n\n<p>Businesses should maintain the same level of caution regarding security as we do in our everyday lives. Would you eat a candy bar off the ground that someone else had already taken a bite of? Of course not! In the same way, businesses shouldn\u2019t take unnecessary risks where they don\u2019t know what could happen or how things could end up.<\/p>\n\n\n\n<p>Tyv\u00e4rr, n\u00e4r det kommer till cybers\u00e4kerhet, har dessa samma sunda f\u00f6rnuftskoncept \u00e4nnu inte inf\u00f6rts. Det \u00e4r lika riskabelt att plocka upp och anv\u00e4nda ett USB-minne som tappats p\u00e5 marken som att \u00e4ta mat fr\u00e5n golvet. Men de flesta har \u00e4nnu inte l\u00e4rt sig att inte g\u00f6ra det senare sedan barndomen. Och det \u00e4r viktigt att utbilda m\u00e4nniskor om farorna i den digitala v\u00e4rlden.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"focus-on-the-organizations-vulnerabilities\"><strong>Focus on the organization\u2019s vulnerabilities<\/strong><\/h3>\n\n\n<p>We naturally focus on those threats that have the best chance of being exploited and inflicting a significant impact. Ten major vulnerabilities are more accessible to fix than 100 minor ones. Instead of improving one exposure at a time until it\u2019s gone, many organizations make this mistake and hyperfocus on repairing one until it\u2019s fixed rather than reducing many risks simultaneously.<\/p>\n\n\n\n<p>This myopic vision creates a false sense of security and gives CISOs the impression that they\u2019re doing their jobs when, in reality, they\u2019re only making marginal improvements.<\/p>\n\n\n\n<p>Additionally, when an organization\u2019s security is breached, it\u2019s not just the CISO\u2019s job on the line. The whole company\u2019s reputation is at stake. So, everyone in the organization needs to be up-to-date on the latest security threats.<\/p>\n\n\n\n<p>And finally, even if a company has cyber security insurance, more is needed. The average data breach cost is $3.86 million, and that\u2019s just the average! The total cost could be much higher depending on the size of the company and the type of data stolen.<\/p>\n\n\n\n<p>Cybersecurity insurance only covers a fraction of the total cost and doesn\u2019t contribute to improving the company\u2019s security posture. So, even if a company has insurance, it\u2019s still in its best interest to do everything it can to prevent a breach from happening in the first place.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"reduce-attack-surface\"><strong>Minska attackytan<\/strong><\/h3>\n\n\n<p>Ett av de kritiska omr\u00e5dena f\u00f6r att f\u00f6rhindra APT-hot \u00e4r att minska attackytan eller ta bort \u00f6verfl\u00f6diga komponenter som inte anv\u00e4nds. Rimliga h\u00e4rdningsprocedurer och solid konfigurationshantering \u00e4r nyckeln till framg\u00e5ng.<\/p>\n\n\n\n<p>\u00d6ppna portar och skript kan g\u00f6ra en organisation s\u00e5rbar f\u00f6r s\u00e4kerhetsintr\u00e5ng. Om dessa tj\u00e4nster hackas kan konsekvenserna bli katastrofala. Men om en organisation anv\u00e4nder tj\u00e4nster inte f\u00f6r legitima \u00e4ndam\u00e5l och dessa tj\u00e4nster komprometteras, har du all r\u00e4tt att vara orolig.<\/p>\n\n\n\n<p>M\u00e5nga framg\u00e5ngsrika APT-attacker har utnyttjat aktiverade funktioner men anv\u00e4nds inte f\u00f6r praktiska \u00e4ndam\u00e5l.<\/p>\n\n\n\n<p>Organisationer kan f\u00f6rb\u00e4ttra sin s\u00e4kerhet genom att minska antalet programvara, applikationer och systemfunktioner. F\u00e4rre funktioner inneb\u00e4r f\u00e4rre m\u00f6jligheter f\u00f6r angripare att hitta en v\u00e4g in.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"be-aware-of-htmlembedded-email-content\"><strong>Var medveten om HTML-inb\u00e4ddat e-postinneh\u00e5ll<\/strong><\/h3>\n\n\n<p>Organizations that use HTML-embedded content in their email are more susceptible to spear phishing attacks from APTs. While some people use the HTML features in an email to play with colours and backgrounds or embed content, most businesses don\u2019t require HTML for their day-to-day operations.<\/p>\n\n\n\n<p>Ibland skickar folk dig e-postmeddelanden med l\u00e4nkar i dem. Folk kanske klickar p\u00e5 l\u00e4nken och tror att den kommer att ta dem dit de vill g\u00e5. Men cyberbrottslingar har hittat ett s\u00e4tt att d\u00f6lja den faktiska destinationen i e-postens kod.&nbsp;<\/p>\n\n\n\n<p>Om organisationer st\u00e4ngde av HTML-e-post skulle de stoppa m\u00e5nga spjutfiskeattacker.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"raise-awareness-of-users\"><strong>\u00d6ka anv\u00e4ndarnas medvetenhet<\/strong><\/h3>\n\n\n<p>M\u00e5nga faror kommer in i ett n\u00e4tverk p\u00e5 bedr\u00e4gliga s\u00e4tt, som att locka anv\u00e4ndaren att \u00f6ppna en bilaga eller klicka p\u00e5 en l\u00e4nk de inte borde. Sessioner kan g\u00e5 l\u00e5ngt f\u00f6r att minska den totala exponeringen genom att begr\u00e4nsa de \u00e5tg\u00e4rder en anv\u00e4ndare f\u00e5r utf\u00f6ra med l\u00e4mplig medvetenhet.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"conduct-behavior-ranking\"><strong>Genomf\u00f6r beteenderankning<\/strong><\/h3>\n\n\n<p>Often, sophisticated attackers use standard tactics to determine whether something is secure. Even though this method isn\u2019t very reliable, it\u2019s still widely used by innumerable assailants.<\/p>\n\n\n\n<p>Attackers want to go undetected, so you must be careful about their actions. Many attackers try to look like regular traffic. They do this so they can get past security without being noticed. But once they\u2019re inside, they show their true intentions. So you need to watch out for certain types of behavior and figure out if it looks more like a regular user or someone with evil motives.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"create-a-sandboxing-environment\"><strong>Skapa en sandl\u00e5demilj\u00f6<\/strong><\/h3>\n\n\n<p>En sandl\u00e5da \u00e4r en isolerad testmilj\u00f6 som g\u00f6r det m\u00f6jligt f\u00f6r anv\u00e4ndare att k\u00f6ra program eller k\u00f6ra filer utan att p\u00e5verka resten av systemet.<\/p>\n\n\n\n<p>En typisk aff\u00e4rsmilj\u00f6 har m\u00e5nga anv\u00e4ndare som beh\u00f6ver tillg\u00e5ng till olika applikationer och data. Men inte alla anv\u00e4ndare beh\u00f6ver tillg\u00e5ng till alla applikationer och data. De flesta anv\u00e4ndare beh\u00f6ver bara tillg\u00e5ng till en liten delm\u00e4ngd av applikationerna och data.<\/p>\n\n\n\n<p>Genom att skapa en sandl\u00e5demilj\u00f6 kan f\u00f6retag begr\u00e4nsa m\u00e4ngden data och applikationer som anv\u00e4ndare kan komma \u00e5t. En sandl\u00e5da kommer att minimera risken f\u00f6r ett dataintr\u00e5ng och minska effekten om ett intr\u00e5ng intr\u00e4ffar.<\/p>\n\n\n\n<p>Dessutom kan sandl\u00e5dor ocks\u00e5 hj\u00e4lpa till att f\u00f6rhindra att skadeprogram sprids. Om en anv\u00e4ndare \u00f6ppnar en fil som inneh\u00e5ller skadeprogram kommer skadeprogrammet att isoleras i sandl\u00e5dan och kan inte infektera resten av systemet.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"implement-least-privilege\"><strong>Implementera minst privilegium<\/strong><\/h3>\n\n\n<p>Minst privilegium \u00e4r en s\u00e4kerhetsprincip som s\u00e4ger att anv\u00e4ndare endast ska ges den minsta niv\u00e5n av \u00e5tkomst som kr\u00e4vs f\u00f6r att utf\u00f6ra sitt jobb.<\/p>\n\n\n\n<p>Till exempel b\u00f6r anv\u00e4ndare endast ges redigerings\u00e5tkomst om de l\u00e4ser data fr\u00e5n en databas. Genom att begr\u00e4nsa anv\u00e4ndare till den minsta n\u00f6dv\u00e4ndiga \u00e5tkomstniv\u00e5n kan f\u00f6retag minska risken f\u00f6r ett dataintr\u00e5ng.<\/p>\n\n\n\n<p>Dessutom b\u00f6r f\u00f6retag ocks\u00e5 \u00f6verv\u00e4ga att implementera minst privilegium f\u00f6r applikationer. Om en applikation bara beh\u00f6ver l\u00e4sa data fr\u00e5n en databas b\u00f6r du inte ge den skriv\u00e5tkomst. Genom att begr\u00e4nsa applikationer till den minsta n\u00f6dv\u00e4ndiga \u00e5tkomstniv\u00e5n kan f\u00f6retag ytterligare minska risken f\u00f6r ett dataintr\u00e5ng.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"secure-the-networks-outbound-traffic\"><strong>Secure the network\u2019s outbound traffic<\/strong><\/h3>\n\n\n<p>Eftersom utg\u00e5ende trafik mer sannolikt inneh\u00e5ller data som stulits fr\u00e5n ett n\u00e4tverk \u00e4r det \u00e4nnu viktigare att \u00f6vervaka den. Genom att titta p\u00e5 utg\u00e5ende trafik kan du identifiera ovanlig aktivitet och vidta \u00e5tg\u00e4rder f\u00f6r att f\u00f6rhindra att ditt f\u00f6retag skadas.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"understand-how-the-offence-operates\"><strong>F\u00f6rst\u00e5 hur brottet fungerar<\/strong><\/h3>\n\n\n<p>F\u00f6r att skydda din organisation fr\u00e5n APT-attacker m\u00e5ste du f\u00f6rst\u00e5 hur attackerna fungerar. Du m\u00e5ste ocks\u00e5 h\u00e5lla dig uppdaterad om de senaste attackmetoderna f\u00f6r att f\u00f6rbereda ditt f\u00f6rsvar.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"control-the-endpoint\"><strong>Kontrollera slutpunkten<\/strong><\/h3>\n\n\n<p>Angripare kan anv\u00e4nda en slutpunkt f\u00f6r att komma in i ett n\u00e4tverk, men deras huvudm\u00e5l \u00e4r vanligtvis att stj\u00e4la data. Om du vill skydda dina data och minimera effekten av en attack, <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/feature\/Endpoint-security-strategy-Focus-on-endpoints-apps-or-both\" target=\"_blank\" rel=\"noreferrer noopener\">fokusera p\u00e5 att s\u00e4kra och \u00f6vervaka slutpunkten.<\/a><\/p>\n\n\n\n<p>Organisationer kan anv\u00e4nda m\u00e5nga olika tekniker f\u00f6r att kontrollera slutpunkten. En vanlig metod \u00e4r att kr\u00e4va tv\u00e5faktorsautentisering (TFA) f\u00f6r alla anv\u00e4ndare. TFA s\u00e4kerst\u00e4ller att endast auktoriserade anv\u00e4ndare kan komma \u00e5t data.<\/p>\n\n\n\n<p>En annan metod \u00e4r att anv\u00e4nda applikationsvitlistning. Denna teknik till\u00e5ter endast godk\u00e4nda applikationer att k\u00f6ras p\u00e5 en slutpunkt. Genom att kontrollera vilka applikationer som f\u00e5r k\u00f6ras kan du minska risken f\u00f6r en attack.<\/p>\n\n\n\n<p>Du kan ocks\u00e5 anv\u00e4nda \u00f6vervakningsverktyg f\u00f6r att kontrollera slutpunkten. Dessa verktyg kan hj\u00e4lpa dig att uppt\u00e4cka och svara p\u00e5 misst\u00e4nkt aktivitet.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"implement-a-data-classification-system\"><strong>Implementera ett dataklassificeringssystem<\/strong><\/h3>\n\n\n<p>Du m\u00e5ste ha en l\u00e4mplig dataklassificeringsprocedur f\u00f6r att skydda ditt f\u00f6retag fr\u00e5n APT:er. Ett data <a href=\"https:\/\/www.sciencelearn.org.nz\/resources\/1438-classification-system\" target=\"_blank\" rel=\"noreferrer noopener\">klassificeringssystem<\/a> inneb\u00e4r att veta vilken information som \u00e4r tillr\u00e4ckligt k\u00e4nslig f\u00f6r att kr\u00e4va skydd. Ett av problemen med APT:er \u00e4r att de st\u00e4ndigt f\u00f6rs\u00f6ker stj\u00e4la data fr\u00e5n din organisation. Du kan inte stoppa allt fr\u00e5n att l\u00e4mna ditt f\u00f6retag, men att ha en l\u00e4mplig dataklassificeringsprocedur hj\u00e4lper dig att f\u00f6rsvara dig mot dessa attacker.<\/p>\n\n\n\n<p>Det b\u00e4sta s\u00e4ttet att lagra dina data \u00e4r p\u00e5 ett internetbaserat lagringsn\u00e4tverk. Detta lagringsn\u00e4tverk \u00e4r mycket s\u00e4kert och hj\u00e4lper till att h\u00e5lla dina data s\u00e4kra. Det \u00e4r ocks\u00e5 viktigt att endast till\u00e5ta n\u00f6dv\u00e4ndig information att l\u00e4mna f\u00f6retaget s\u00e5 att k\u00e4nsliga data f\u00f6rblir intakta.<\/p>\n\n\n\n<p>Om du har tv\u00e5 filer, en offentlig kunskap och den andra konfidentiell, \u00e4r den konfidentiella filen i st\u00f6rre risk eftersom folk kanske inte vet att den \u00e4r hemlig. En organisation kan nu reglera och hantera informationsfl\u00f6det med en datal\u00e4ckagef\u00f6rebyggande (DLP) l\u00f6sning som \u00e4r n\u00e4ra kopplad till digital r\u00e4ttighetshantering (DRM).<\/p>\n\n\n\n<p>Det finns flera steg i en l\u00e4mplig dataklassificeringsprocedur:<\/p>\n\n\n\n<p>1. Best\u00e4m administrat\u00f6ren<\/p>\n\n\n\n<p>2. Specificera datatyperna<\/p>\n\n\n\n<p>3. Kategorisera data<\/p>\n\n\n\n<p>4. St\u00e4ll in s\u00e4kerhetskontroller<\/p>\n\n\n\n<p>5. Utbilda anst\u00e4llda i proceduren<\/p>\n\n\n\n<p>6. \u00d6vervaka och granska proceduren<\/p>\n\n\n\n<p>3. Best\u00e4m v\u00e4rdet av data<\/p>\n\n\n\n<p>4. Klassificera data<\/p>\n\n\n\n<p>5. Skapa en policy<\/p>\n\n\n\n<p>6. Utbilda anst\u00e4llda<\/p>\n\n\n\n<p>7. Genomdriv policyn<\/p>\n\n\n\n<p>8. \u00d6vervaka efterlevnad<\/p>\n\n\n\n<p>En dataklassificeringsprocedur \u00e4r en viktig del av varje s\u00e4kerhetsplan. Genom att implementera en klassificeringsprocedur kan du hj\u00e4lpa till att skydda ditt f\u00f6retag fr\u00e5n APT:er.<\/p>\n\n\n\n<p>Cybers\u00e4kerhet \u00e4r avg\u00f6rande. Organisationer kommer att forts\u00e4tta bli hackade, men vi k\u00e4mpar fortfarande.&nbsp;<\/p>\n\n\n\n<p>We can\u2019t always stop every attack, but by being prepared and diligent, we can limit the damage that hackers can do.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>En APT-attack \u00e4r en typ av cyberattack som utf\u00f6rs av en motiverad och resursstark angripare som har som m\u00e5l att f\u00e5 l\u00e5ngsiktig tillg\u00e5ng till ett m\u00e5ls n\u00e4tverk. Attacken utf\u00f6rs av... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/cyberhot\/apt-avancerat-bestaende-hot\/\">Continue reading <span class=\"screen-reader-text\">APT (avancerat ih\u00e5llande hot)<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":635,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APT (Advanced Persistent Threat) | Security Briefing<\/title>\n<meta name=\"description\" content=\"An overview of APTs, what they are and how they work. Learn why companies continue to be vulnerable to them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/cyberhot\/apt-avancerat-bestaende-hot\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT (Advanced Persistent Threat) | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"An overview of APTs, what they are and how they work. Learn why companies continue to be vulnerable to them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/cyberhot\/apt-avancerat-bestaende-hot\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-21T21:43:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"APT (Advanced Persistent Threat)\",\"datePublished\":\"2022-08-21T21:43:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\"},\"wordCount\":1827,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\",\"articleSection\":[\"Cyber Threats\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\",\"name\":\"APT (Advanced Persistent Threat) | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\",\"datePublished\":\"2022-08-21T21:43:26+00:00\",\"description\":\"An overview of APTs, what they are and how they work. Learn why companies continue to be vulnerable to them.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg\",\"width\":558,\"height\":500,\"caption\":\"APT banner\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT (Advanced Persistent Threat)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"APT (Avancerat Ih\u00e5llande Hot) | S\u00e4kerhetsgenomg\u00e5ng","description":"En \u00f6versikt \u00f6ver APT:er, vad de \u00e4r och hur de fungerar. L\u00e4r dig varf\u00f6r f\u00f6retag forts\u00e4tter att vara s\u00e5rbara f\u00f6r dem.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/cyberhot\/apt-avancerat-bestaende-hot\/","og_locale":"sv_SE","og_type":"article","og_title":"APT (Advanced Persistent Threat) | Security Briefing","og_description":"An overview of APTs, what they are and how they work. Learn why companies continue to be vulnerable to them.","og_url":"https:\/\/securitybriefing.net\/sv\/cyberhot\/apt-avancerat-bestaende-hot\/","og_site_name":"Security Briefing","article_published_time":"2022-08-21T21:43:26+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"C\u00e9sar Daniel Barreto","Ber\u00e4knad l\u00e4stid":"9 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"APT (Advanced Persistent Threat)","datePublished":"2022-08-21T21:43:26+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/"},"wordCount":1827,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","articleSection":["Cyber Threats"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/","name":"APT (Avancerat Ih\u00e5llande Hot) | S\u00e4kerhetsgenomg\u00e5ng","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","datePublished":"2022-08-21T21:43:26+00:00","description":"En \u00f6versikt \u00f6ver APT:er, vad de \u00e4r och hur de fungerar. L\u00e4r dig varf\u00f6r f\u00f6retag forts\u00e4tter att vara s\u00e5rbara f\u00f6r dem.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/APT-banner.jpg","width":558,"height":500,"caption":"APT banner"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/apt-advanced-persistent-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"APT (Advanced Persistent Threat)"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar Daniel Barreto","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto \u00e4r en uppskattad cybers\u00e4kerhetsskribent och expert, k\u00e4nd f\u00f6r sin djupg\u00e5ende kunskap och f\u00f6rm\u00e5ga att f\u00f6renkla komplexa cybers\u00e4kerhets\u00e4mnen. Han har l\u00e5ng erfarenhet av n\u00e4tverkss\u00e4kerhet och dataskydd och bidrar regelbundet med insiktsfulla artiklar och analyser om de senaste trenderna inom cybers\u00e4kerhet, som utbildar b\u00e5de yrkesverksamma och allm\u00e4nheten.","url":"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=524"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/524\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/635"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}