Exploring Initial Access Tactics and Malware Similarities Used by Iran, North Korea, Russia, and China Advanced Persistent Threat Groups

Guardado en:
Detalles Bibliográficos
Publicado en:ProQuest Dissertations and Theses (2025)
Autor principal: Simons, Ryan P.
Publicado:
ProQuest Dissertations & Theses
Materias:
Acceso en línea:Citation/Abstract
Full Text - PDF
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!

MARC

LEADER 00000nab a2200000uu 4500
001 3201334005
003 UK-CbPIL
020 |a 9798314865361 
035 |a 3201334005 
045 2 |b d20250101  |b d20251231 
084 |a 66569  |2 nlm 
100 1 |a Simons, Ryan P. 
245 1 |a Exploring Initial Access Tactics and Malware Similarities Used by Iran, North Korea, Russia, and China Advanced Persistent Threat Groups 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a Advanced persistent threats (APTs) exploit vulnerabilities in cyber defenses daily and update their tactics, techniques, and procedures (TTPs) to remain one step ahead of the defenders. Four prominent nation-state threats targeting the United States that continually appear in headlines include North Korea, Russia, Iran, and China. To identify how to start defending against threat actors, it is necessary to understand where and how threats are getting into networks. This study aims to identify similarities, patterns, and themes across four nation-states in the initial access and custom malware used. The goal of this research is to allow network defenders to make decisions based on what the adversary has previously done, what they are currently doing, and some new techniques the threat actors have been seen using. This information could prove vital to resource decisions, network appliances, social engineering training, and other network defense initiatives and strategies. The malware sampling and analysis will give insight into what languages the adversaries use, their typical functionalities, and some of the campaigns in which the malware has been used. This research can be a first look into what is currently being done by the adversary threat groups of the four most prominent national security threats. From initial access methods, this study will discover what the most prominent vector is being used to gain access to networks. Malware analysis will try to find the commonalities that the threat actors are using. Investigating these two prominent areas could lead to discovering the actual root cause of how these attackers remain successful in their endeavors and could give the defenders a chance to narrow their attack surface and make themselves harder targets for these attackers.  
653 |a Information technology 
653 |a Computer science 
653 |a Computer engineering 
773 0 |t ProQuest Dissertations and Theses  |g (2025) 
786 0 |d ProQuest  |t ProQuest Dissertations & Theses Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3201334005/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3201334005/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch