Advanced persistent threats are a new way of life

Characteristics of APTs include quiet infiltration, high-value targeting and human management

There's plenty of irony in the recent announcement by RSA, EMC's security division, that information about its SecurID two-factor authentication product apparently has been stolen through a sophisticated advanced persistent threat.

Last month’s announcement merely illustrates what the company has been saying for some time: Such threats probably are inevitable for high-value targets, and traditional defenses don't provide adequate protection.

It is commendable that RSA has publicly announced the incident to customers and investors despite the potential for embarrassment. That openness, if continued, could help provide valuable intelligence about such threats and help in the development of effective defenses against them. In fact, RSA advocated such openness in a recent white paper.

Related stories:

Hackers gain access to RSA's SecurID security tokens

New cyber threats emerging, and IPv6 won't make defense any easier

An advanced persistent threat, usually referred to as an APT, is a descriptive rather than technical term that describes a broad class of attacks. RSA Chief Technology Officer Bret Hartman enumerated APTs' distinguishing characteristics during the RSA Security Conference in February.

  • “It’s low and slow,” intended to infiltrate quietly and insert itself in various places in a system so it's difficult to remove if detected.
  • It is targeted, going after high-value assets, such as intellectual property, that can provide a return on the expense of sophisticated, possibly one-of-a-kind attacks.
  • A human is behind it, motivated and with the resources to persist with multiple attacks against a target.
Because they often exploit carefully husbanded zero-day vulnerabilities, “there is some percentage that is always going to get through,” Hartman said.

As with most security threats, it is unlikely that we will be able to completely win the battle against APTs, but defenses can be improved. Toward that end, RSA and VMware released in February a security brief on improving security operations to tackle these threats.

“While it may be impractical, even impossible, to prevent APTs, organizations nevertheless can deflect such attacks by making themselves difficult, unprofitable targets, or by discovering APTs early to prevent large-scale damage,” the paper states. “This involves developing intelligent, comprehensive approaches to help organizations become faster and more efficient at detecting APTs, neutralizing them and identifying perpetrators.”

The paper outlines core elements for defending against APTs:

  • Risk planning to better understand potential information targets.
  • Attack modeling to better understand potential attacks.
  • Virtualized environments to better segregate information and systems.
  • Predictive analysis to integrate compliance monitoring with risk management.
  • Automated, risk-based decision systems to quickly assess and respond to threats.
  • Forensic analysis and information sharing to help defend against future attacks.
RSA has started using at least one of those elements — information sharing — with the announcement of the breach, and RSA Executive Chairman Art Coviello promised to continue the process.

“As appropriate, we will share our experiences from these attacks with our customers, partners and the rest of the security vendor ecosystem and work in concert with these organizations to develop means to better protect us all from these growing and ever more sophisticated forms of cybersecurity threat,” he wrote in an open letter.

Inevitably, there will be some proprietary information involved in RSA’s investigation, and not every detail will be revealed. But RSA has an opportunity to practice what it has preached by releasing as much information as possible about the breach.


  • Records management: Look beyond the NARA mandates

    Pandemic tests electronic records management

    Between the rush enable more virtual collaboration, stalled digitization of archived records and managing records that reside in datasets, records management executives are sorting through new challenges.

  • boy learning at home (Travelpixs/

    Tucson’s community wireless bridges the digital divide

    The city built cell sites at government-owned facilities such as fire departments and libraries that were already connected to Tucson’s existing fiber backbone.

Stay Connected