4 min read

The email connection with ATP attacks

The email connection with ATP attacks

Advanced persistent threats (APTs) are sophisticated cyberattacks in which the attacker gains unauthorized access to a system and remains undetected for an extended period. Unlike opportunistic attacks, APTs are highly targeted, strategic, and persistent.

As the study APT Attacks: Become The Most Dangerous Cyber Threat for Email Security in 2020, describe it, an APT is an attack in which a hackeraccesses a system and goes undetected.It is this ability to remain undetected that makes APTs particularly dangerous in healthcare settings that manage protected health information (PHI). The longer an attacker remains inside a system, the greater the risk of widespread data exposure and HIPAA violations.

 

The email connection

The authors of the study APT Attacks: Become The Most Dangerous Cyber Threat for Email Security in 2020 identified APTs as the most successful email-based attack type in bypassing security technologies. In 2020, APTs had a 97.42% success rate in reaching target inboxes, making them the single most successful attack type measured.

 

The email delivery mechanism

Email remains the primary delivery channel for APT attacks. Most campaigns begin with phishing-style emails that appear legitimate and trustworthy. Attackers impersonate executives, vendors, or partner organizations, crafting messages designed to evade detection and suspicion.

In the study, a large-scale APT-focused test illustrates how effective these campaigns can be. As noted in the reportAPT is more successful at bypassing security technologies and reaching target inboxes than phishing and other types of attacks.”

In the testing campaign:

  • 274,816 emails were sent to evaluate APT-focused vulnerabilities.
  • 162,562 emails successfully reached target inboxes.
  • Only 4,189 emails were blocked by security tools.
  • 108,065 recipients (around 40%) did not check the emails in question.

According to the above study, almost 40% of recipients ignored suspicious emails entirely. When high inbox delivery rates are paired with low user engagement, it opens up an opportunity for attackers to operate unnoticed.

 

APT attack cases

Here are some real-world examples of APTs using email as their weapon:

  • APT29 (Cozy Bear) and APT28 (Fancy Bear): These two Russian APT groups are linked to various high-profile cyberattacks, including the breach of the Democratic National Committee (DNC) in the United States. They use phishing emails as a primary method to trick victims into downloading malware or revealing sensitive information.
  • APT32 (OceanBuffalo): APT32, a group associated with the Vietnamese government, used email phishing campaigns to target various organizations, including multinational corporations and political dissidents. They often send emails with malicious attachments or links to compromise their victims.
  • APT33 (Elfin): APT33, believed to be Iranian in origin, also uses phishing emails to deliver malware. They've targeted organizations in the aerospace and energy sectors, distributing emails that contain either harmful attachments or links leading to malicious websites.
  • APT35 (Charming Kitten): Another Iranian APT group, APT35, is known for using spear-phishing emails to target individuals and organizations, especially those associated with Middle East politics. They write convincing emails to trick recipients into clicking on malicious links or opening infected attachments.
  • APT41 (Winnti Group): APT41 is a Chinese APT group that engages in both cyber espionage and cybercrime activities. They've used phishing emails to deliver malware to their targets, often exploiting software vulnerabilities to gain access to systems.
  • APT34 (OilRig): APT34, an Iranian group, used spear-phishing emails to target individuals and organizations in the Middle East. They use social engineering techniques to write emails that encourage recipients to open malicious documents.
  • APT1 (Comment Crew): APT1 is believed to be a Chinese military-affiliated group involved in numerous cyber espionage activities. They use email-based spear-phishing campaigns to compromise a wide range of targets.

Go deeper:

How to defend against email-based APT attacks

According to Microsoft, advanced persistent threats arestealthy and continuous computer hacking processesthat require a coordinated response combining both technology and human expertise.

 

Managed detection and response (MDR)

Microsoft notes thatsolutions like managed detection and response help organizations detect and respond to threats using a combination of technology and human expertise.”

Managed detection and response (MDR) services provide continuous surveillance of systems to identify unusual behavior, suspicious login activities, lateral movements within the network, and attempts at data exfiltration. In healthcare settings where PHI is particularly valuable, this real-time monitoring can reduce the amount of time attackers remain undetected.

The goal of MDR is early detection. The faster an APT is identified, the less damage it can cause.

 

Zero Trust security model

APTs often succeed because attackers gain initial access through email and then move laterally across the network. A Zero Trust model helps prevent this spread by assuming that no user or device should be trusted automatically, even if they are inside the network perimeter.

Under a Zero Trust framework:

  • Access is granted on a least-privilege basis
  • Multi-factor authentication (MFA) is enforced
  • Continuous verification is required
  • Network segmentation limits lateral movement

When organizations restrict access pathways, they can prevent attackers from escalating privileges or reaching sensitive systems that store PHI.

 

Endpoint detection and behavioral analytics

Traditional signature-based security tools struggle against APTs because these threats constantly evolve. Behavioral analytics and endpoint detection tools, however, monitor for unusual patterns rather than known malware signatures.

This includes identifying:

  • Abnormal login times
  • Unusual file access patterns
  • Large data transfers
  • Privilege escalation attempts

 

Email security hardening

Since email is a primary entry point for APTs, strengthening email security is essential. This includes:

  • Advanced phishing detection
  • Link and attachment scanning
  • DMARC, DKIM, and SPF implementation
  • Encryption for sensitive communications

 

Incident response readiness

Microsoft notes thatwhile no defense is perfect,organizations can significantly reduce impactif an attack is detected.”

Healthcare organizations should ensure they can:

  • Isolate compromised systems quickly
  • Revoke unauthorized credentials
  • Notify compliance and legal teams
  • Meet HIPAA breach notification timelines

Related: Why investing in ongoing cybersecurity training is good business

 

Paubox in APT prevention

Paubox can strengthen this first line of defense by:

  • Blocking phishing and spoofing attempts before they reach users
  • Scanning links and attachments for malicious content
  • Enforcing DMARC, DKIM, and SPF policies
  • Automatically encrypting outbound email

Paubox reduces the number of malicious emails that reach inboxes and decreases reliance on user judgment, thus limiting the primary entry point that APT attackers depend on.

While no single solution can eliminate APT risk, strengthening email security as part of a layered defense strategy significantly reduces exposure.

See also: HIPAA Compliant Email: The Definitive Guide

 

FAQS

How long can an APT remain undetected?

APTs can remain inside a network for weeks, months, or even longer if not properly detected. Their goal is to operate quietly, avoiding triggers that would alert security teams.

 

What are common signs of an APT attack?

While APTs are designed to be stealthy, warning signs may include unusual login activity, unexplained privilege changes, abnormal data transfers, or suspicious outbound traffic. Continuous monitoring is essential to identify these subtle indicators.

Subscribe to Paubox Weekly

Every Friday we bring you the most important news from Paubox. Our aim is to make you smarter, faster.