2 min read

What Are Advanced Persistent Threats & How To Prevent Them

Liviu ARSENE

July 07, 2017

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
What Are Advanced Persistent Threats & How To Prevent Them

Financial gain is often the main motivator behind advanced attacks. So, with that in mind, let”s take a closer look at an APT that targeted a Bangladesh bank, whose purpose was to transfer around $951 million into the cybercriminal’s bank accounts.

The malware exploited vulnerabilities in the bank’s SWIFT financial platform by patching a specific library, making the host application believe a failed security check had in fact succeeded.

This gave the malware the privileges to grant itself the ability to execute database transactions on the victim network.

In this instance, $81 million was actually transferred internationally, although part of that was actually recovered by law enforcement following the investigation.

So, if you’re an organization, financial or otherwise, how can you defend yourself against advanced attacks that exploit applications using memory manipulation – also known as zero-day vulnerabilities?

Although your everyday endpoint security is incredibly effective in dealing with common threats, such as keyloggers, and in helping your company meet compliance standards, it will have a tougher and tougher time fighting off more complex, custom-built attacks.

Bitdefender Hypervisor Introspection is a revolutionary technology that scans raw memory at the hypervisor level, without any in-guest (VM) agents, leveraging a recent XenServer API.

Zero-day protection through memory introspection comes from outside of the VM, enabling the solution to detect even sophisticated unknown threats, such as APTs, intercepting and blocking them from tampering with the memory stack, and injecting remediation tools if needed.

Bitdefender realized that the way to catch the most advanced threats is to not rely on information from the OS.

So we set to devise a unique solution to this dilemma, a new security layer at the hypervisor level, in an unprecedented collaboration with Citrix, Linux foundation, and Intel.

It”s difficult to know whether the solution would have completely prevented the theft of $81 million, but it would have certainly detected the attempt to patch the library module, that leveraged a memory manipulation technique.

This patch was critical to the heist, and preventing its execution would have stopped that portion of the APT and blocked the hackers” access to SWIFT”s Alliance software.

For more information about Bitdefender Hypervisor Introspection, how it works, or how to request a demo, please check out www.bitdefender.com/HVI .

tags


Author



Right now

Top posts

Abode IoT Security Camera Vulnerabilities Would Let Attackers Insert Images, Bitdefender Finds

Abode IoT Security Camera Vulnerabilities Would Let Attackers Insert Images, Bitdefender Finds

December 21, 2021

2 min read
Online Shoppers Beware, Mobile Scams Are on the Rise

Online Shoppers Beware, Mobile Scams Are on the Rise

December 17, 2021

2 min read
The Holiday Guide to Tech Support: Fixing the Family Computer

The Holiday Guide to Tech Support: Fixing the Family Computer

November 24, 2021

2 min read
Bitdefender Celebrates 20 Years of Cybersecurity Leadership

Bitdefender Celebrates 20 Years of Cybersecurity Leadership

November 04, 2021

3 min read
Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

October 26, 2021

3 min read
What are drive-by download attacks and how do you prevent them?

What are drive-by download attacks and how do you prevent them?

October 25, 2021

2 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Apple Patches New Zero-Day and Nasty Privacy Bug with iOS 15.3 and macOS 12.2 Apple Patches New Zero-Day and Nasty Privacy Bug with iOS 15.3 and macOS 12.2
Filip TRUȚĂ

January 27, 2022

2 min read
Microsoft Uncovers New SolarWinds Vulnerability While Analyzing Log4j Exploit Activity Microsoft Uncovers New SolarWinds Vulnerability While Analyzing Log4j Exploit Activity
Silviu STAHIE

January 26, 2022

1 min read
Take Your QNAP NAS Offline! DeadBolt Ransomware Locks Devices via Alleged Zero-Day Flaw Take Your QNAP NAS Offline! DeadBolt Ransomware Locks Devices via Alleged Zero-Day Flaw
Filip TRUȚĂ

January 26, 2022

1 min read