Evolutionary Step Discovered in Determined Cyberattacks
Author:CSC Cybersecurity Engineering
Advances in threat detection techniques have driven adversaries and aggressors to develop a new type of attack that goes beyond traditional malware and even newer polymorphic malware. While defending our most critical government and commercial enterprises, we've characterized a next-level threat that goes beyond what any code can do on its own.
With the discovery of this latest human-morphic dimension to the most determined of attacks, we have updated the conventional wisdom on the five (now six) stages of an advanced persistent threat(APT):
- New: Counterattack
Through in-depth analysis, CSC can efficiently identify this new breed of highly adaptive malware. By exposing likely infection dates, uncovering methods of resistance, revealing antivirus logic, recovering embedded encryption keys, isolating covert channels, and fully exposing the malicious capabilities of these threats, CSC can move quickly to provide protection from and remediation of these threats.
To download the full report, and fully understand what the impact of humanmorphic threats on businesses and governments, please select the pdf to the right. This report is provided free of charge or registration to ensure the public is aware of these threats, and can take appropriate steps to be prepared.