• Skip to primary navigation
  • Skip to main content
S2 Grupo

Spanish Company Specialized in Cybersecurity

  • Company
    • About Us
    • Governing Bodies
    • CSR
    • Awards and Acknowledgments
  • Specialization
    • OT Industry
    • IT
    • OT Health
  • Solutions
  • R&D+I
  • Talent
  • News & Publications
  • Contact
  • facebook
  • twitter
  • instagram
  • linkedin
|
en arrow down
  • es
© 2023 S2 Grupo
Corporate

Advanced Persistent Threats are the largest cyber risk to which organizations currently expose themselves to

11 Apr 2017
  • The book "Advanced Persistent Threats" developed by Antonio Villalón, Director of Security of S2 Grupo, analyzes the keys to this type of cyber-attacks and cyberspace that today affects any type of organization whose information is worth money, that is, all.
  • This type of threats are led by States, organized criminal groups, companies, etc., with a large amount of economic and human resources to undertake the attack and a great interest in the information that the victim has.
  • As the author pointed out, the main mistake that is made when dealing with these types of threats is to consider them a type of malware.

Madrid, April 6, 2017.- The company S2 Grupo, specialized in cybersecurity and management of critical systems, presented this morning at its headquarters in Madrid the book "Advanced Persistent Threats" (APTs) developed by its Director of Security, Antonio Villalón. This meeting, in which the associate-directors of S2 Grupo, José Rosell and Miguel A. Juan, participated together with the author, focused on how APTs are currently one of the biggest cyber risks for any type of organization whose data are worth money , that is, all. "Most of today's cyberspace is mainly driven by economic issues, including between "friendly" countries. If we are negotiating the purchase of gas with a producing country, vital information for us would be to know how much our contact person is willing to lower the price, as it will give us a privileged position in our negotiations", said Antonio Villalón. As explained, an APT is a process initiated by a third party (usually an organization, a criminal group, a company, a state, etc.) with the ability and intention to attack in an advanced way (through multiple vectors) and continued over time, a specific objective (a competitor, another state, a sector, etc.). Ultimately, APTs are organized groups of mafias or governments that seek money, steal information or sabotage an organization. What these have in common is that the attackers have a large amount of resources (human, financial, material, etc.), much knowledge and, what is more dangerous, a great interest in the information that their victim handles. In addition, this great ability coupled with their particular way of acting, which in a secretive way, seeks to continue stealing information as long as it can in an company, makes them a great threat. In the book by Antonio Villalón, was been edited by Nau Llibres, from the main actors who play in information theft to the defense approaches against them are exposed, going through the tactics, techniques and procedures that are applied from the so-called cyber intelligence. In addition, there are also well-known cases of APTs, such as the so-called "Red October", which spent years in silence and aimed to steal diplomatic information from the victims. In this case, a modular kit was designed to obtain information from different platforms, including mobile phones, and to recover deleted files. "APTs are the way organized states and groups get into their target systems to take possession of information with economic, geopolitical or defense interests, among others. A feature that sets them apart from other types of cyber risk is that nothing is accidental in them, everything is planned to the millimeter. Orchestrating an attack of this type can cost thousands or millions of euros and, of course, is not launched against random victims, as can happen in the case of a banking phishing, for example", said Miguel A. Juan. An error and a problem: considering APTs as malware and the difficulty of whom attributing the crime to One of the points which Antonio Villalón puts special emphasis on when talking about the management of this type of incidents is that the most common mistake should be avoided which is to consider these threats as malware. "The APT is not a harmful code, neither advanced or non-advanced, but a capability. And as a capability we must face it and manage the incident associated with a compromise. The malware is eradicated, threat information needs are not, so we can be sure that the attacker will return and we must be prepared for that return", said Villalón. Another problem associated with this type of threats is the difficulty in attributing the authorship of the same. In this sense, José Rosell stressed that “the problem in assigning cyberattacks is in the evidence on which it is based on, since these may have been manipulated, since it is evidence that the attacker has somehow shown somewhere on a voluntary or involuntary basis. For example, we may believe that a cyberattack is produced from Russia because we see code in Cyrillic or a server is detected there, but that this is no more than a trick of manipulation and that the true origin is in any other country.” José Rosell About the author: Antonio VillalónHe is the Director of Security of S2 Grupo, Engineer in Computer Science (Polytechnic University of Valencia), Director of Security (University of Valencia) authorized by the Ministry of Interior and CISA auditor (ISACA). He has more than 20 years of experience in the field of cybersecurity.In his professional career he has executed and directed analysis, defense, attack and exploitation projects, as well as set up and managed security and incident response centers. In addition, he accumulates extensive teaching experience, being habitual in courses and conferences in different congresses and universities. More information: prensa@s2grupo.es

  • fb
  • tw
  • in
Related Articles
Show all →
Corporate
Eight cyber risks associated with the use of wearables
Read more →
Corporate
More than 57% of video game console users are unaware that these can be hacked
Read more →
Corporate
Investment in R&D, key to increasing the competitiveness of cybersecurity SMEs
Read more →

Follow us in our newsletter

Subscribe through your email to stay up to date

S2 Grupo
© 2023 S2 Grupo
  • Press Center
  • Legal Disclaimer
  • Privacy Policy
  • Cookie policy
S2 Grupo utiliza cookies propias y de terceros para permitir tu navegación, fines analíticos y para mostrarte publicidad personalizada en base a un perfil elaborado a partir de tus hábitos de navegación (por ejemplo, páginas visitadas). Clica aquí para acceder a nuestra Política de Cookies. Puedes aceptar todas las cookies pulsando el botón “ACEPTAR” o configurar o rechazar su uso pulsando el Botón “CONFIGURAR”
ConfigurarAceptar cookies
Manage consent

Resumen de Privacidad

Este sitio web utiliza cookies para mejorar su experiencia mientras navega por el sitio web. De estas, las cookies que se clasifican como necesarias se almacenan en su navegador, ya que son esenciales para el funcionamiento de las funcionalidades básicas del sitio web. También utilizamos cookies de terceros que nos ayudan a analizar y comprender cómo utiliza este sitio web. Estas cookies se almacenarán en su navegador solo con su consentimiento. También tiene la opción de optar por no recibir estas cookies. Pero la exclusión voluntaria de algunas de estas cookies puede afectar su experiencia de navegación.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
CookieDurationDescription
pll_language1 yearThe pll _language cookie is used by Polylang to remember the language selected by the user when returning to the website, and also to get the language information when not available in another way.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Necessary
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
_GRECAPTCHA6 monthsThis cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks.
cookielawinfo-checkbox-analytics1 yearSet by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Analytics" category .
cookielawinfo-checkbox-functional1 yearThe cookie is set by the GDPR Cookie Consent plugin to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necesaria1 yearSet by the GDPR Cookie Consent plugin to store the user consent for cookies in the category "Necessary".
CookieLawInfoConsent1 yearRecords the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie.
SAVE & ACCEPT
Powered by CookieYes Logo