Your web browser may be malfunctioning. Your internet connection may be unreliable. The increase of cyber attacks for the purpose of espionage is a growing threat. Recent examples, such as hacking of the Democratic National Committee and indicting by the FBI of Chinese military personnel for cyber economic espionage, are adobe pdf numbered listing 10 extra space of the severity of the problem.
This paper aims at providing a comprehensive survey of open source publications related to APT actors and their activities, focusing on the APT activities, rather than research on defensive or detective measures. It is intended to serve as a quick reference on the state of the knowledge of APT actors, where interested researchers can find what primary sources are most relevant to their research. The paper covers publications related to around 40 APT groups from multiple regions across the globe. A short summary of the main findings of each publication is presented. Polytechnique de Montréal in the Department of Computer and Software Engineering, specializing in securing ICS and SCADA networks against threats from nation states. He also has work experience as a security analyst and holds a number of professional certifications, including CISSP, GSEC and GCIH.
He previously worked as a malware researcher, focusing on in-depth malware investigations. 2013, and has spoken at security conferences such as REcon, Virus Bulletin and hack. He focuses on innovative ways to detect malicious network intrusion, and studies malware obfuscation, to identify nefarious behaviour within a network at any step of a cyber-attack. Software Engineering at the École Polytechnique de Montréal. His current research interests include malware and botnet analysis, security product testing methodologies, critical infrastructure security and security and integration of logical and physical access control systems.