Got it

What does a brutal DDoS attack have to do with APT?

Created: Feb 16, 2022 21:13:20Latest reply: Feb 17, 2022 06:37:20 338 4 23 0 0
  HiCoins as reward: 0 (problem unresolved)

What does a brutal DDoS attack have to do with APT?

Thanks

  • x
  • convention:

Featured Answers
olive.zhao
Admin Created Feb 17, 2022 01:57:11

Hello, friend!

DDoS attacks are related to APIs because DDoS has the following features:

  • Attacking service diversity.

  • Diversified attack traffic.

  • Diversified attack devices

Hope this helps!

View more
  • x
  • convention:

faysalji
faysalji Created Feb 17, 2022 06:38:13 (0) (0)
he is asking for APT  
All Answers
AndresMoreno
AndresMoreno Admin Created Feb 16, 2022 21:15:13

Hello! Thank you for contacting us.
We are working on an answer for you.
View more
  • x
  • convention:

olive.zhao
olive.zhao Admin Created Feb 17, 2022 01:57:11

Hello, friend!

DDoS attacks are related to APIs because DDoS has the following features:

  • Attacking service diversity.

  • Diversified attack traffic.

  • Diversified attack devices

Hope this helps!

View more
  • x
  • convention:

faysalji
faysalji Created Feb 17, 2022 06:38:13 (0) (0)
he is asking for APT  
faysalji
faysalji Moderator Author Created Feb 17, 2022 06:37:20

There are many ways in which APT attacks typically manifest themselves. This includes

1)fraud and theft,
2)ransomware,
3)state-level attacks to critical infrastructure,
4)personal data theft, and
5)Distributed Denial of Service (DDoS).

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable to users by flooding it with traffic from multiple services. These attacks are becoming increasingly common and complicated with the growing reliance on digital services and connected devices. According to an article from ZDNet, “One of the reasons that DDoS attacks have become cheaper and easier to carry out is because of the proliferation of IoT devices. Large numbers of IoT products come with default usernames and passwords that aren’t reset, meaning it’s easy for hackers to take control of them.”

What is an APT

An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, long-term presence on a network in order to mine highly sensitive data.

The targets of these assaults, which are very carefully chosen and researched, typically include large enterprises or governmental networks. The consequences of such intrusions are vast, and include:

Intellectual property theft (e.g., trade secrets or patents)
Compromised sensitive information (e.g., employee and user private data)
The sabotaging of critical organizational infrastructures (e.g., database deletion)
Total site takeovers

Executing an APT assault requires more resources than a standard web application attack. The perpetrators are usually teams of experienced cybercriminals having substantial financial backing. Some APT attacks are government-funded and used as cyber warfare weapons.

APT attacks differ from traditional web application threats, in that:

They’re significantly more complex.
They’re not hit and run attacks—once a network is infiltrated, the perpetrator remains in order to attain as much information as possible.
They’re manually executed (not automated) against a specific mark and indiscriminately launched against a large pool of targets.
They often aim to infiltrate an entire network, as opposed to one specific part.

More common attacks, such as remote file inclusion (RFI), SQL injection and cross-site scripting (XSS), are frequently used by perpetrators to establish a foothold in a targeted network. Next, Trojans and backdoor shells are often used to expand that foothold and create a persistent presence within the targeted perimeter.
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.
Information Protection Guide
Thanks for using Huawei Enterprise Support Community! We will help you learn how we collect, use, store and share your personal information and the rights you have in accordance with Privacy Policy and User Agreement.