Investigation into PlugX Uncovers Unique APT Technique By Gilbert Sison, Abraham Camba ( words) Published: 2021-01-20 · Archived: 2026-04-05 21:40:53 UTC Advanced persistent threats (APT) are known — and are universally dreaded — for their stealth. Actors behind such attacks actively innovate their techniques to evade detection and ensure that they maintain a foothold inside an environment as long as possible. Through the Apex One with Endpoint Sensor (iES)products, we discovered one such incident wherein an attacker utilized sophisticated techniques in an attempt to exfiltrate sensitive information from a company. The unique tactics, techniques, and procedures (TTPs) used in this attack highlight the importance of cross-layered detection and response solutions. Technical analysis Detection We noticed the execution of schtasks.exe with the command line parameter “schtasks /create /tn c:\programdata\\.bat /sc /once /st