© 2015 IBM Corporation
5
Infiltrating a trusted partner and then loading
malware onto the target’s network
Creating designer malware tailored to only infect
the target organization, preventing identification
by security vendors
Using social networking and social engineering to
perform reconnaissance on spear-phishing
targets, leading to compromised hosts and
accounts
Exploiting zero-day vulnerabilities to gain access
to data, applications, systems, and endpoints
Communicating over accepted channels such as
port 80 to exfiltrate data from the organization
Des attaquants bien organisés et des internes malveillants
contournent avec succès les défenses de sécurité
Concepteur de logiciels
malveillants Porte dérobée
Harponnage Persistance
Escalade des motifs et de la
sophistication
Espionnage et activisme
Acteurs États-Nation