Methods of attack
Gokhan Yuceler – Analyzing a target-oriented attack
As technology provides services and facilities to people, companies, and states in every field, the term "Digital Data" has been coined, a new concept that should be protected. As the value of data increases and the sector expands, the attackers and attack types that try to violate data increase in direct proportion.
IT teams that continue to fight defensively within the ecosystem that states describe as a "cyber war" have to work against professional attackers, called Advanced Persistent Threat (APT) groups, who work with a target-oriented attack motivation, and try to stay within the systems they infiltrate without leaving a trace for months or even years, and thus perform many harmful activities, from data leakage to ransom demands.
In our analysis, which will be made up of the tactical, technical, and procedural (TTP) stages of a real target-oriented attack, we will refer...