Saturday, July 19, 2025
LBNN
  • Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • Documentaries
No Result
View All Result
LBNN

Top 6 factors driving Advanced Persistent Threat (APT) attacks – IT News Africa

Simon Osuji by Simon Osuji
July 4, 2023
in Technology
0
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

A laptop representing broadband usage

Related posts

Customs seizes 420kg Pangolin scales in Kano – EnviroNews

Customs seizes 420kg Pangolin scales in Kano – EnviroNews

July 19, 2025
Climate justice movements celebrate African leadership in rejecting solar geoengineering at AMCEN – EnviroNews

Climate justice movements celebrate African leadership in rejecting solar geoengineering at AMCEN – EnviroNews

July 19, 2025

Kaspersky experts have identified several key contributors to the success of Advanced Persistent Threat (APT) operations within victims’ networks. These factors include human elements, inadequate security measures, difficulties with updates and configuration of cybersecurity solutions, and other related issues.

Although some of these reasons may seem trivial, they are commonly encountered during incident response activities. To assist companies in mitigating these threats and promoting the adoption of best practices, the experts have compiled a list of the most prevalent issues:

Insufficient Isolation of OT Networks

The security of Operational Technology (OT) networks is compromised due to a lack of proper isolation, as highlighted by incident investigations conducted by Kaspersky experts. One common issue is the presence of engineering workstations that are connected to both the regular IT network and the OT network, leaving vulnerabilities in the system.

Relying solely on network equipment configuration for OT network isolation proves to be ineffective against experienced attackers who can easily reconfigure the equipment to their advantage. These attackers can exploit such configurations to control malware traffic or use them as a storage and delivery system for malware, even in supposedly isolated networks. Kaspersky has observed such malicious activities on multiple occasions.

The Human Factor in Cybercriminal Activities

Granting access to OT networks without considering proper information security measures can lead to exploitation. Remote administration utilities like TeamViewer or Anydesk, initially set up temporarily, often remain active and can be exploited by attackers.

Dissatisfied employees, driven by various motivations such as work assessments, income, or political factors, may engage in cybercriminal actions. Implementing a Zero Trust approach, where neither the user, device, nor application within the system is inherently trusted, can mitigate such risks.

Inadequate Protection and Configurations of OT Assets

Incident analysis has revealed several vulnerabilities in OT networks, including outdated security solution databases, missing or removed license keys, disabled security components, and excessive exclusions from scanning and protection. These shortcomings contribute to the spread of malware within the networks.

For example, outdated databases and failure to update security solutions automatically create opportunities for advanced threats to propagate quickly, especially in APT attacks, where sophisticated threat actors aim to avoid detection.

Insecure Configurations of Security Solutions

APT groups/actors critically depend on proper configurations of security solutions to prevent them from being disabled or abused. Attackers may hijack critical IT systems and target the administration servers of security solutions to gather information or use tools within the security system to spread malware to supposedly separate systems.

The Lack of Cybersecurity Protection in OT Networks

Surprisingly, some OT networks lack cybersecurity solutions installed on many endpoints, leaving them vulnerable to attacks. Even if the OT network is physically separated from other networks and not connected to the Internet, attackers can still find ways to gain access. For instance, they can distribute specially crafted malware through removable drives like USBs.

Challenges with Workstation and Server Security Updates

Industrial control systems have unique operational requirements, making tasks like installing security updates on workstations and servers challenging. These updates often require careful testing during scheduled maintenance, leading to infrequent updates. Threat actors take advantage of this delay to exploit known vulnerabilities and carry out attacks.

Updating the server’s operating system may even necessitate upgrading specialized software like SCADA servers, which can be costly. Industrial control system networks commonly have outdated systems as a result. Surprisingly, even Internet-facing systems in industrial enterprises, which are relatively easier to update, can remain vulnerable for extended periods, exposing operational technology (OT) to attacks and serious risks.

 

Source link

Previous Post

Andy Reid hailed as greatest coach of all time…by one of his former quarterbacks

Next Post

What is AI Governance and Why do We Need It?

Next Post
What is AI Governance and Why do We Need It?

What is AI Governance and Why do We Need It?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED NEWS

Minister Motshekga wraps up SANDF service calls at Military Health Service

Minister Motshekga wraps up SANDF service calls at Military Health Service

10 months ago
Death announcement of Margaret Wanjiru Mbitu of Whitman MA

Death announcement of Margaret Wanjiru Mbitu of Whitman MA

2 years ago
Kenya Gov’t to Introduce Dollar Bond Targeting Diaspora Investors

Kenya Gov’t to Introduce Dollar Bond Targeting Diaspora Investors

1 year ago
Does Ross have a Credit Card?

Does Ross have a Credit Card?

6 months ago

POPULAR NEWS

  • Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    0 shares
    Share 0 Tweet 0
  • When Will SHIB Reach $1? Here’s What ChatGPT Says

    0 shares
    Share 0 Tweet 0
  • The world’s top 10 most valuable car brands in 2025

    0 shares
    Share 0 Tweet 0
  • Top 10 African countries with the highest GDP per capita in 2025

    0 shares
    Share 0 Tweet 0
  • Tanzania’s natural gas sector goes global with Dubai deal

    0 shares
    Share 0 Tweet 0
  • Privacy Policy
  • Contact

© 2023 LBNN - All rights reserved.

No Result
View All Result
  • Home
  • Business
  • Politics
  • Markets
  • Crypto
  • Economics
    • Manufacturing
    • Real Estate
    • Infrastructure
  • Finance
  • Energy
  • Creator Economy
  • Wealth Management
  • Taxes
  • Telecoms
  • Military & Defense
  • Careers
  • Technology
  • Artificial Intelligence
  • Investigative journalism
  • Art & Culture
  • Documentaries
  • Quizzes
    • Enneagram quiz
  • Newsletters
    • LBNN Newsletter
    • Divergent Capitalist

© 2023 LBNN - All rights reserved.