Once an attacker has breached an organization, they can take what they can find and run or embed themselves further. Establishing this persistence lets them find ways to maintain a presence in an organization to continuously gain recon, affect systems, and steal information.
In this blog series, we’re detailing every stage of the cyberattack lifecycle, the techniques used in them, and how you can defend against them. Before this, we covered Exploitation. Now, Installation.
After gaining initial access, attackers can establish persistence to develop footholds within a network, expanding their attack from a one-time breach to an ongoing threat. Given the potential amount of effort to get them to this point, attackers want to be able to capitalize as much as possible on their investment. By establishing persistence, they can create footholds that enable backdoor entries and expand options for further infection and data exfiltration.
Adversaries use multiple methods to install backdoors and develop persistence. Here are just a few examples:
Protecting against persistence requires a combination of preventative measures, detection strategies, and incident response protocols.
Persistence is generally a tactic used by sophisticated attackers and groups. But, given the trend of commoditization within cybercrime, techniques like persistence and others are becoming more widespread.
Keep reading our blog to learn about each stage in the cyberattack lifecycle, and how a defense-in-depth approach helps you to prevent and defend against these new and emerging threats.