YOGYAKARTA - Advanced persistent threat (APT) is a form of cyber threat that needs to be watched out for in the era of digital technology like now. This cyber attack was carried out for various purposes, such as hacking, commercial, and theft of state important data. However, not many people know what advanced persistent threat is.

ApT cyber attacks can target individuals, organizations, up to the server level of a country. Even this cyberattack can last for a long time repeatedly and be able to adapt from defensive actions. To maintain cybersecurity, you need to know what advanced persistent threat is and how to detect it.

Advanced Persistent Threat (APT) is a term to describe an attack campaign. Perpetrators of this cyberattack carry out their actions in a relatively long period of time on illegal networks.

The purpose of this cyber attack varies, but the most common APT action is to mining high-level information or sensitive data. Here are some impacts or losses that you will receive if you experience an APT attack:

The resources needed to carry out APT actions are more than standard web application attacks. The attack usually consists of a special team that contains experienced people and has large financial capital. This cyber attack could be supported by the government as a cyber warfare weapon.

APT cyber attacks are carried out with a sequential approach to get further access. Here's how APT works that you need to know:

The first step taken in the APT attack was an attempt to gain access through the internet system. The perpetrator will enter malware (dangerous software) by breaking through the weakness of the web application or phishing email.

Once access, the perpetrators will spy further and create a backdoor network through the malware that has been entered previously. Perpetrators can even remove their footprint by rewriting the code.

If the perpetrator is already in the target network, the pelau will look for greater access with the code hacking method. In this way, the perpetrator may have higher access and more freely controls the system.

At this stage, the perpetrators have access as administrators and can act as they please around the network. Even the perpetrators are able to find safe areas and try to access new servers.

The perpetrators began extracting information by focusing, encryption, and data compression.

The perpetrators took the data that was successfully extracted and stored it in their database system.

Perpetrators can repeat the action or process in a long time as long as the attack has not been detected.

Advanced persistent threat is a category of cyberattacks that are difficult to detect. However, APT attacks can also show certain signs. Here are some ways to detect APT attacks that you need to know.

Demikianlah review mengenai apa itu advanced persistent threat dan cara kerjanya. APT merupakan salah satu kejahatan siber yang berbahaya sehingga perlu diwaspadai. Anda bisa menerapkan cara-cara di atas untuk mendeteksi dan mencegah serangan APT.

Stay up to date with the latest domestic and other overseas news on VOI. You present the latest and most updated nationally and internationally.


The English, Chinese, Japanese, Arabic, and French versions are automatically generated by the AI. So there may still be inaccuracies in translating, please always see Indonesian as our main language. (system supported by DigitalSiber.id)