In the same way that a known character or image is reflected within an industry by feigning a happy face, advanced persistent threats exist and are often camouflaged through the phenomenon of pareidolia (they resemble something else) within industrial networks. But how can we spot these threats? And, above all, is it possible to pre-empt their malicious intentions?
Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: APT
In December 2015 part of the electricity sector in Ukraine was attacked by the Trojan BlackEnergy. This modular Trojan that allows different additional malware to be loaded left a million and a half people without electricity.