Security Experts:

Connect with us

Hi, what are you looking for?



APT Attacks Can Be Launched Using Basic Skills: Imperva

Imperva Examines the “Non-Advanced Persistent Threat”

Not everything about the threats facing today’s enterprises is advanced.

Imperva Examines the “Non-Advanced Persistent Threat”

Not everything about the threats facing today’s enterprises is advanced.

In fact, as Imperva points out in a new report, the type of data breaches commonly associated with advanced persistent threats can sometimes be achieved without high levels of skill.

“Advanced Persistent Threat (APT) is a name given to attacks that specifically and persistently target an entity,” Imperva noted in a report entitled ‘The Non-Advanced Persistent Threat.’ “The security community views this type of attack as a complex, sophisticated cyber-attack that can last months or even years. The skill and scope required to instigate an attack of this magnitude and sophistication are believed to be beyond the reach of individual hackers.”

“Despite these common perceptions (see Wikipedia), our labs discovered that some techniques attributed to APT require only basic skills,” the report continued. “For example, there are simple ways to accumulate access privileges by attacking common Windows protocols. To provide evidence of this, the attacks we examined targeted commonly known, inherent weaknesses of the Microsoft NTLM protocol, and leveraged basic social engineering, Windows skills, and readily available software.”

“By attacking an organization using non-advanced techniques and still achieving the same goals, we learn that the problem of data exfiltration is in fact bigger than just the APT problem, and that companies should take a more holistic approach to protect their data centers and the data that resides in them,” blogged Barry Shteiman, director of security strategy at Imperva. “If a hacker can achieve the same results with or without APT, it becomes a different ball game.”

The report describes security flaws and attacks dealing with in NTLM, including pass the hash and NTLM relay attacks. According to the report, NTLM’s authentication response calculation does not require the plaintext password – it requires the NT or LM hash, which makes the LM or NT hash comparable to plaintext passwords. It also describes the NTLMv1 challenge response algorithm as weak, and states that an attacker who has access to the challenge and the response can calculate the LM or NT hash used for authentication. Given that the hashes are password equivalents, an attacker can authenticate as the user with the hashes.

Once an attacker compromises one machine, he or she gains access privileges of the current logged on user. The goal from then on is often to extend access by compromising more accounts. 

“NTLM protocol weaknesses provide an attacker a perfect opportunity to extend his access privileges to targeted resources – as long as those resources support NTLM authentication,” according to the report. “Note that Windows file shares and some databases – mainly MS SQL [Microsoft SQL Server] and Oracle – support windows based authentication using NTLM.”

The report also describes how attackers go about “poisoning the well” by introducing content to a shared folder that forces SMB traffic from users who browse that file to communicate with a compromised machine. 

“When planning a corporate security strategy, one of the things I truly believe is that the CIO should not only try to prevent hackers from getting in, but should assume that hackers can get in and that they may access your data,” Shteiman blogged. “From that point the game is all about knowing that this happens. Monitoring, audit, and blocking controls around data are essential in order to prevent the next big data breach.”

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.