Threat intelligence

The role of threat intelligence in tracking advanced persistent threats (groups)

Over the last couple of years, we’ve observed the blurring of boundaries, as different types of threats are deployed by different types of threat actors for a variety of purposes.

Tools developed by state secret services and threat actors related to government have been leaked to the black market. This has put advanced exploits at the disposal of criminal groups that would otherwise not have access to such sophisticated code. Consequently, Advanced Persistent Threats (APTs) are no longer only targeting mostly specific government institutions and critical infrastructure but also other commercial sectors. One example is the emergence of advanced targeted threat (APT) campaigns focused not on cyberespionage, but on theft - stealing money to finance other activities the APT group is involved in.

To protect against APT (group) attacks it is imperative to study the adversary and their techniques and tools used during attacks. Sophisticated Threat Intelligence will probe to identify the specific characteristics of an APT (group) and search for the intrusion techniques and customised tools developed for each target during each stage of an attack - infiltration, expansion and exfiltration.

However, only a handful of organisations truly have the research capacity and global reach to effectively predict and therefore prevent APT (group) attacks.

Kaspersky’s Global Research and Analysis Team (GReAT) has developed unrivalled expertise in the discovery and analysis of APT activity across the globe. They're tracking ongoing activity of 200+ threat actors, sophisticated malicious operations, cyberespionage campaigns and major malware, ransomware and underground cybercriminal trends in 85 countries, leveraging petabytes of Kaspersky statistical data and deep knowledge about malware behaviors acquired during 20 years of continuous, global threat research.

Back to the threat intelligence home page

Related video

Related Articles

Threat intelligence

Is your organisation ready for threat intelligence?

Threat intelligence

Use threat intelligence to find the needle in your cybersecurity data stack

Threat intelligence

Better understanding of how to use attribution in threat intelligence

Talk to us

Please do not hesitate to contact us if you would like any further information or have any questions.

Request a call