Remembering When APT Became Public
Last week I Tweeted the following on the 8th anniversary of Google's blog post about its compromise by Chinese threat actors:
This intrusion made the term APT mainstream. I was the first to associate it with Aurora, in this post
http://ift.tt/2EFYig2
My first APT post was a careful reference in 2007, when we all feared being accused of "leaking classified" re China:
http://ift.tt/2FEkkBd
I should have added the term "publicly" to my original Tweet. There were consultants with years of APT experience involved in the Google incident response, and they recognized the work of APT17 at that company and others. Those consultants honored their NDAs and have stayed quiet.
I wrote my original Tweet as a reminder that "APT" was not a popular, recognized term until the Google announcement on 12 January 2010. In my Google v China blog post I wrote:
Welcome to the party, Google. You can use the term "advanced persistent threat" (APT) if you want to give this adversary its proper name.
I also Tweeted a similar statement on the same day:
This is horrifying: http://bit.ly/7x7vVW Google admits intellectual property theft from China; it's called Advanced Persistent Threat, GOOG
I made the explicit link of China and APT because no one had done that publicly.
This slide from a 2011 briefing I did in Hawaii captures a few historical points:
The Google incident was a watershed, for reasons I blogged on 16 January 2010. I remember the SANS DFIR 2008 event as effectively "APTCon," but beyond Mandiant, Northrup Grumman, and NetWitness, no one was really talking publicly about the APT until after Google.
As I noted in the July 2009 blog post, You Down With APT? (ugh):
Aside from Northrup Grumman, Mandiant, and a few vendors (like NetWitness, one of the full capture vendors out there) mentioning APT, there's not much else available. A Google search for "advanced persistent threat" -netwitness -mandiant -Northrop yields 34 results (prior to this blog post). (emphasis added)
Today that search yields 244,000 results.
Today, I would argue we're "past APT." APT was the buzzword for RSA and other vendor-centric events from, say, 2011-2015, with 2013 being the peak following Mandiant's APT1 report.
The threat hasn't disappeared, but it has changed. I wrote my Tweet to mark a milestone and to note that I played a small part in it.
from TaoSecurity http://ift.tt/2DbO8qr
This intrusion made the term APT mainstream. I was the first to associate it with Aurora, in this post
http://ift.tt/2EFYig2
My first APT post was a careful reference in 2007, when we all feared being accused of "leaking classified" re China:
http://ift.tt/2FEkkBd
I should have added the term "publicly" to my original Tweet. There were consultants with years of APT experience involved in the Google incident response, and they recognized the work of APT17 at that company and others. Those consultants honored their NDAs and have stayed quiet.
I wrote my original Tweet as a reminder that "APT" was not a popular, recognized term until the Google announcement on 12 January 2010. In my Google v China blog post I wrote:
Welcome to the party, Google. You can use the term "advanced persistent threat" (APT) if you want to give this adversary its proper name.
I also Tweeted a similar statement on the same day:
This is horrifying: http://bit.ly/7x7vVW Google admits intellectual property theft from China; it's called Advanced Persistent Threat, GOOG
I made the explicit link of China and APT because no one had done that publicly.
This slide from a 2011 briefing I did in Hawaii captures a few historical points:
The Google incident was a watershed, for reasons I blogged on 16 January 2010. I remember the SANS DFIR 2008 event as effectively "APTCon," but beyond Mandiant, Northrup Grumman, and NetWitness, no one was really talking publicly about the APT until after Google.
As I noted in the July 2009 blog post, You Down With APT? (ugh):
Aside from Northrup Grumman, Mandiant, and a few vendors (like NetWitness, one of the full capture vendors out there) mentioning APT, there's not much else available. A Google search for "advanced persistent threat" -netwitness -mandiant -Northrop yields 34 results (prior to this blog post). (emphasis added)
Today that search yields 244,000 results.
Today, I would argue we're "past APT." APT was the buzzword for RSA and other vendor-centric events from, say, 2011-2015, with 2013 being the peak following Mandiant's APT1 report.
The threat hasn't disappeared, but it has changed. I wrote my Tweet to mark a milestone and to note that I played a small part in it.
Copyright 2003-2016 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)
from TaoSecurity http://ift.tt/2DbO8qr