ABSTRACT

Cyber attack patterns have evolved from the one-toone scenario, through one-to-many and into a many-to-one format. An increasing number of services offered in the cybercrime underground allow miscreants to purchase access to hacked computers at specific organizations. Attackers cam remain active in the target system for long periods and give priority to a specific task, rather than to opportunistic exploits and again, they often appear to be guided by external entities. The Dogma malware was repacked every few hours to help it to avoid anti-virus detection and Dogma partners were instructed not to check whether anti-virus detection was effective on the downloaded files. As a result, the Dogma malware remained undetected by many anti-virus products. Any method that causes the target system to exceed its capacity can potentially be used in a denial of service (DoS) attack. Advanced persistent threats (APTs) are attacks that primarily target business and political entities.