This month, both Symantec and McAfee issued reports focused on a series of cyber attacks which systematically target major governmental and corporate networks worldwide.
These advanced threats cannot be detected by traditional network security practices, but Sword & Shield has developed a Data Breach Threat Analysis that can assist companies in determining if they are a victim by gathering, correlating and analyzing information from critical points on the network.
There are hundreds of these types of attacks, but the most common are known as Operation Shady RAT, Operation Aurora and Night Dragon. These advanced threats work when an attacker targets an organization, creates an email with an attachment and sends it to individuals in those organizations who may have some interest in the attachment subject. These attachments are loaded with exploit code and, when the user opens the file, the code is executed. Once the Trojan is installed, it contacts a remote site where the attacker then directly seizes control of the compromised computer. With just a few commands, the attacker breaches the organization and collects valuable and proprietary information.
“The documented success of today’s advanced threats require an equal amount of investment into the detection and eradication of the compromise as that given to the prevention of compromise,” said Sword & Shield Director of Computer Forensics Bill Dean.
The following video explains how Sword & Shield can respond to this growing threat:
For more information on how we can help, please contact us on this website or call 865-244-3500.