Workflow
高级持续性威胁(APT)
icon
Search documents
APT组织研究年
Lv Meng Ke Ji· 2025-04-08 01:55
Investment Rating - The report does not explicitly state an investment rating for the industry or company. Core Insights - The report highlights the increasing complexity and frequency of Advanced Persistent Threat (APT) attacks, which pose significant risks to national security and stability in the digital age [21][22]. - Collaboration between industry and academia, specifically between the report's company and Guangzhou University, aims to enhance early detection and response capabilities against APT threats through innovative technologies [22][24]. - The report provides a comprehensive analysis of APT organizations, detailing their activities, targets, and the evolving landscape of cyber threats [22][26]. Summary by Sections APT Attribution Tracking Situation Analysis - In 2024, a total of 51 APT organizations were monitored, with over 1,400 threat hosts controlled by these organizations, 50% of which originated from abroad [31][32]. - The number of APT organizations increased from 565 to 620, marking a 57.14% growth compared to 2023 [31][32]. - The report identifies that the education, healthcare, enterprise, and financial sectors were significantly impacted by APT activities [50]. APT Organization Intelligence Analysis - The report recorded 241 analysis reports on APT organizations in 2024, with Turla Group being the most analyzed [63][64]. - A total of 55 new APT organizations were added to the database, reflecting the dynamic nature of cyber threats [63][64]. - The report emphasizes the importance of understanding the geopolitical context influencing APT activities, particularly in regions like Eastern Asia and the Middle East [70]. APT Attack Methods Analysis - SSH and RDP brute force attacks accounted for 91% of the APT attack methods employed [58]. - The report indicates a significant increase in the number of vulnerabilities disclosed, with a focus on high-risk vulnerabilities in emerging technology areas [76]. - APT organizations are increasingly targeting supply chains, utilizing zero-day vulnerabilities to infiltrate systems [73].