Phishing Apts Advanced Persistent Threats
Most of the reported APT intrusions, such as Operation Aurora (2009), HBGary Federal hack (2011) and RSA hack (2011), all started with the notorious spear phishing scheme to gain initial access to the victim institution’s network. APT phishers can make use of the targeted institution’s personnel public information available on the Internet to generate vivid phishing emails to lure them into the trap. Once they succeed in entering their targeted network, they will be able to eavesdrop on the victim’s digital assets on a regular basis....