Workflow
高级持续性威胁(APT)
icon
Search documents
关于数字资产“高级持续性威胁(APT)”及“链上防火墙”多智能体协同的思考
Tai Mei Ti A P P· 2025-10-11 03:27
文 | 逻辑学家 今年的Token2049恰逢十一假期,逛展之余也有了更多思索沉淀的时间。会展火爆一如往年,作为一名 有着深厚安全基因的从业者,为市场繁荣感到欣喜,也还是会被层出不穷的安全事件影响,思考如何构 筑更安全、更稳健的行业未来。这份思考既来自展会见闻,也源于团队在人工智能与数字资产一线的实 践与探索。遂成此文,谨供诸位参考探讨。 "国家级黑客":数字资产安全新战场 这一态势催生了数字资产领域的"高级持续性威胁"(Advanced Persistent Threat)概念。与传统网络安全 中的APT相比,数字资产领域的APT具有三个更严峻的特征:其一,利害关系更直接,攻击目标直接锁 定可即时转移的巨额金融资产,攻击"投产比"极高;其二,攻击链条更短平,一旦私钥失守或合约被攻 破,资产瞬间流失,响应时间窗口极短;其三,攻击手法高度定制化,专门针对高净值个人、企业高管 进行长期、精准的社会工程学攻击,深度融合人性弱点与技术漏洞。 在实践中,AI与智能体技术有能力从个人到国家、从技术到运营形成立体化防护体系,构建数字资产 领域的"智能体军团"。 在个人层面,AI智能体扮演着"数字保镖"的角色。它能7x24小 ...
APT组织研究年
Lv Meng Ke Ji· 2025-04-08 01:55
Investment Rating - The report does not explicitly state an investment rating for the industry or company. Core Insights - The report highlights the increasing complexity and frequency of Advanced Persistent Threat (APT) attacks, which pose significant risks to national security and stability in the digital age [21][22]. - Collaboration between industry and academia, specifically between the report's company and Guangzhou University, aims to enhance early detection and response capabilities against APT threats through innovative technologies [22][24]. - The report provides a comprehensive analysis of APT organizations, detailing their activities, targets, and the evolving landscape of cyber threats [22][26]. Summary by Sections APT Attribution Tracking Situation Analysis - In 2024, a total of 51 APT organizations were monitored, with over 1,400 threat hosts controlled by these organizations, 50% of which originated from abroad [31][32]. - The number of APT organizations increased from 565 to 620, marking a 57.14% growth compared to 2023 [31][32]. - The report identifies that the education, healthcare, enterprise, and financial sectors were significantly impacted by APT activities [50]. APT Organization Intelligence Analysis - The report recorded 241 analysis reports on APT organizations in 2024, with Turla Group being the most analyzed [63][64]. - A total of 55 new APT organizations were added to the database, reflecting the dynamic nature of cyber threats [63][64]. - The report emphasizes the importance of understanding the geopolitical context influencing APT activities, particularly in regions like Eastern Asia and the Middle East [70]. APT Attack Methods Analysis - SSH and RDP brute force attacks accounted for 91% of the APT attack methods employed [58]. - The report indicates a significant increase in the number of vulnerabilities disclosed, with a focus on high-risk vulnerabilities in emerging technology areas [76]. - APT organizations are increasingly targeting supply chains, utilizing zero-day vulnerabilities to infiltrate systems [73].