Advanced Malware Threats or Advanced Persistent Threats are becoming more and more common in security breaches these days. What are they and what makes them so difficult to combat?
What they are: they are malware that enters the network as normal web traffic. Pretty innocent looking, they are quiet so as not to trigger alerts, and they’re difficult to detect. They can sit there for awhile – weeks, months. Kind of like a bad tapeworm you don’t realize you have.
The thing about today’s malware is, it can morph. It can perform recon, it can establish control over services without even being detected. It can call home, receive new instructions, and transmit outbound data. Scary stuff!
At Halock, we use next generation technology to identify APTs. This technology safely detonates unknown code and suspicious web objects in virtual systems, stops outbound malware transmissions, and can trace the full execution path of zero-day and known attacks .
Traditional signature based solutions are not able to identify zero-day malware infestations. How do you identify a malware whose signature can constantly change?
While signature-based anti-virus and IDS/IPS are important components of a multi-layered approach to information security, advanced malware threat protection will likely be as natural of a component to your security solution arsenal as your firewall was 10 years ago.
Sr. Account Executive