How To Navigate Advanced Persistent Threat (APT) Intrusions
This article provides an overview of concepts counsel must account for when navigating an APT intrusion or any sophisticated attack.
February 28, 2020 at 02:30 PM
8 minute read
Advanced Persistent Threat (APT) intrusions are sophisticated cyber-attacks carried out by well-funded and organized cyber-criminals, nation state actors or, more recently, a combination of both. The attacks are designed to establish persistence using various tactics, techniques and procedures (TTPs) that are intended to avoid detection and mimic authorized activity in the environment, known as "living off the land." APTs' goals may include the acquisition of intellectual property, personal data and financial information or the compromise of infrastructure or specialized data. APT intrusions often result in the unauthorized actor achieving part or all of their objective and can lead to serious reputation and financial damage to a company.
Below is an overview of concepts counsel must account for when navigating an APT intrusion or any sophisticated attack.
Directing the Investigation; Establishing Privilege
As soon as a potential APT intrusion is detected, it is critical to engage attorneys to direct the investigation and establish attorney-client privilege. APT intrusions may involve significant "dwell" time, which means evidence may not be available or definitive. Indeed, APT activities often relate to preexisting vulnerabilities in an environment—even ones that may have been identified by the client. Further, decisions made after the discovery of an incident with regard to containment, remediation, forensics and evidence collection may impact a company's liability down the line. Therefore, it is important to establish privilege at the outset of an investigation.
External counsel should retain third-party assistance, such as forensic investigators, for the purposes of providing legal advice. When external counsel directs third-party forensic investigations and appropriate privilege protocols are in place, courts have generally held forensic investigator's records, reports, communications and other materials related to the investigation are privileged and thus do not need to be disclosed during litigation or regulatory proceedings.
Privilege is never absolute, but clients can take steps to strengthen their position. At least one court has held that documentation related to the forensic investigation of an incident by a third party was not privileged because the third party was already engaged to assist with other ongoing work streams when the third party discovered the incident and the amended statement work did not change the scope or purpose of the third party's work other than to have the third party report to counsel after the incident was discovered. Companies can better establish privilege if counsel engages the third party for the purposes of providing evidence that enable counsel to provide legal advice. In addition, this work stream should be outside of any previous work stream and in anticipation of litigation or regulatory action.
Other Investigation Issues
APT investigations can be time-consuming and depend on how deeply immersed a threat actor is in an environment and whether the company has good visibility into its environment. Completing a thorough investigation is critical, and understanding the motives and TTPs deployed by an APT group can help streamline and focus an investigation on potential legal implications.
One of the first challenges of an APT intrusion is identifying the threat actor. Forensic teams can use TTPs to identify a threat actor, and if the actor is identified, lawyers can better understand and assess the motivation and risk of the attack. Identification will also enable IT teams to better implement containment and remediation measures. The legal team should partner with forensic teams and internal IT to stress test any findings and ensure all relevant evidence is appropriately collected and analyzed. The forensic teams and internal IT teams' findings will also assist the legal team in determining legal notification requirements based on the evidence available.
Law enforcement interaction can also be beneficial during an investigation and may be necessary depending on the APT and subject matter involved. Assistance is often a valuable resource and can provide known indicators of compromise (IOCs) from other cases, which can be instrumental in determining motive of the attacker. Law enforcement may also provide guidance on how to remediate and investigate a particular threat actor group. For a variety of reasons, including evidentiary and potential liability concerns, the legal team is the likely appropriate client team to interact with law enforcement.
Legal Issues
Whenever a cyber intrusion occurs, determining notification requirements is a priority. Whether to disclose an APT intrusion to another company, law enforcement, regulatory body, the government, or impacted individuals will depend on: (1) the type of company and data potentially affected; (2) the risk associated with such access; and (3) whether any personal data involved triggers data breach notification laws. This analysis is rarely straightforward and requires deliberation on a number of legal implications and potential outcomes because it is both difficult to identify an APT group and, depending on the APT's skill level, only a limited amount of evidence may be available.
Recently, cyber incidents have prompted increased litigation and scrutiny from regulators both in the United States and internationally. Accordingly, decisions to disclose must be made carefully and with a firm understanding of the investigation and the state of the network when the incident occurred. Lawyers are in a better position to present their client's case to regulators when they are familiar with a company's technical and administrative controls and are fluent in applicable legal requirements. Importantly, lawyers steeped in the realities of a company's environment are best-positioned to explain that reasonable security measures were in place despite the intrusion.
With regard to litigation, fully understanding the actions and motives of the threat actor will inform legal strategy. Certain APT groups are known to steal personal data for immediate monetary gain, whereas other APT groups may steal data for monitoring and surveillance. Motive is important because there is currently a circuit split on when class action plaintiffs have standing. Courts agree that alleging actual monetary damages satisfies the "injury in fact" requirement of standing, but courts are split on whether "substantial" risk of future or unknown harm is enough to satisfy standing requirements.
Best Practices and Lessons Learned
Many companies have been compromised, are compromised or will be compromised. Regardless, there are things a company should do now to prepare. An APT intrusion will place an exponential drag on a company's productivity—evidence of a breach will bring scrutiny to any decisions made about security. Companies should expect to explain and defend how cybersecurity was prioritized and handled.
Before an APT intrusion occurs, in-house counsel should help determine whether the client has a defensible cybersecurity program in place. If a company is not sure, consider a compromise assessment overseen by legal or outside counsel. And a company should make sure legal and information security teams have a collaborative relationship—and that they don't get to know each other during a breach. In practice, this means that they work together on everyday cybersecurity incidents, test an incident response plan, work together on a governance program, and meet outside counsel and third parties before they need them.
Below are best practices to consider during an intrusion:
- Engage outside counsel to lead the investigation. If not already selected, ensure experienced outside counsel is brought in to lead the investigation before any third party, including any forensic vendor, is substantively engaged.
- Establish protocols. At a minimum, protocols should state: (1) the investigation is being led by legal counsel who will instruct all external advisors, (2) the objective of the investigation (e.g., to inform legal analysis of obligations, liability, risks, and/or in contemplation of anticipated legal or regulatory proceedings); (3) key work streams; (4) investigation team composition; (5) communication/ reporting lines; (6) steps taken to preserve evidence including the issuing of legal holds; and (7) communications protocols.
- Identify key people involved in the incident response team (IRT). Often we have found that even when an IRP does exist, the team composition is too large and roles and responsibilities are unclear, especially with respect to material decisions that need to be made quickly. A company's IRP should make clear the governance structure, decision-making authority, and the team structure.
- Establish communications protocol. Communication protocols are critical to protecting attorney-client privilege and controlling the incident narrative both internally and externally. Only those necessary should receive internal communications. External communications should be tightly controlled and limited to a need-to-know basis. No communications should be released without prior approval of legal. Failure to control internal and external communications can lead to leaks and result in statements harmful to future litigation or regulatory defenses. Statements may also cause reputational harm or lend themselves to misinterpretations that make the company look like they were hiding something or purposefully misleading consumers.
Legal teams are a key component of any successful cyber incident investigation, even more so when the incident involves an APT. We continue to see the same mistakes being made. The information in this article provides a snapshot of some of main issues we regularly see.
Chris Cwalina is Norton Rose Fulbright's global co-head of data protection, privacy and cybersecurity. Steven Roosa is the global law firm's US Head of NRF digital analytics and technology assessment platform. Tristan Coughlin is a senior associate in the data protection, privacy and cybersecurity practice.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllLaw Firms Mentioned
Trending Stories
- 1Church of Scientology Set to Depose Phila. Attorney in Sexual Abuse Case
- 2An AG Just Specified How AI Could Get You in Hot Water
- 3Supreme Court Appears to Lean Toward Letting TikTok Ban Take Effect
- 4Standing Spat: Split 2nd Circuit Lets Challenge to Pfizer Diversity Program Proceed
- 5Judge Jablonski and Chief Justice Rabner Both Acted Completely Properly
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250