Hello, everyone. I'm instructor Gerry Roberts, and this is introduction to a PT groups.
In this video, we're gonna learn what a P T actually is
and what a P T group ISS.
First of all, what is a P T. A. P T. Stands for advanced, persistent threat.
So let's break that down a little bit.
The advanced portion
means that these attacks used advanced and sophisticated techniques, usually some sort of malware,
like a worm or a virus or something like that, to attack vulnerabilities in a system
so they'll actually use malware or some sort of software to take advantage of a voter ability and assist
the next work. Persistent, persistent just means that is continuous.
Typically, it's some sort of control mechanism, like a suffer program or something like that. They continuously monitors and or collects data from its target, so once they've attacked their target, they don't stop. It continues
when they continue to get information
The threat portion stands for a person or thing that is likely to cause damage. This case is probably both.
A person is probably using a thing like a virus to exploit the vulnerability.
Now that leads us to
what a P T group actually is.
A PT groups are just groups that perpetrate a P T attacks.
A lot of the time these are political or financially motivated.
Originally, when we started seeing these type of attacks, they were state sponsored, government sponsored
and groups that were working with different groups to sabotage different governments.
Now, good example of this was the Stuxnet worm.
Now the Stuxnet worm was a worm that invaded Iran's power grid and actually did quite a bit of damage by changing how some of the mechanical and electrical equipment work.
That was a believed that the attack was state sponsored by the USA or Israel, or possibly both. But no one really actually knows. This is just a theory that Iran had that maybe they were attacked by those people
because they were at that time in a conflict.
No, but it has actually claimed responsibility for
overtime. This has changed as far as state sponsorship goes. Lots of groups, our very diverse. They range from rag tag teams hacktivists. Sometimes they're still state sponsored, But that's not a guarantee of what the group is actually comprised of,
Ah, one of those examples that you probably have heard of our couple hacktivist groups,
including anonymous. They are considered an A P T group because some of the attacks have been considered a P T.
Who did they target?
typically target somebody that has a lot of personal, identifiable information or P I I
s So that would be like a bank or
a social security group or something like that. So they could get that information and possibly sell it or use it themselves.
Governments are also targeted for political reasons. So, like we were talking earlier about the attack on Eireann Ah, the reason that they thought that it was those two particular governments was because of political reasons.
There are a couple common targets that we find
higher education, financial institutions, energy, transportation to acknowledging healthcare, telecommunications, manufacturing in agriculture.
Now, one of the things they il notice there is like energy and other utilities.
A lot of the utilities and equal grow developed world, including the United States and several other countries, are now running water called smart grids. Now, smart grids integrate monitoring
and other controls with the electrical system.
Having said that, that means that if somebody were to get a hold of those controls, they might be able to turn off a lot of the electric, and that could cause a lot of issues. So these are actually big targets, and it's one of the targets that you'll see. A lot of people talking about now
is utilities, especially energy.
All right, so time for our first quiz in this module. Our post assessment question,
the advanced portion of a P T. Means
the Attackers used sophisticated tech needs.
The Attackers attack difficult targets.
The attacks are persistent,
or it means that humans are responsible.
I'll give you a few moments here to figure it out, you composite video as well, and then we'll get the answer
answers. Athe attacks. Use sophisticated techniques or advanced techniques.