Home/Glossary/Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT)

A sophisticated, long-term cyberattack where an intruder gains unauthorized access and remains undetected for an extended period to steal data or cause damage.

Threat IntelligenceAlso called: "advanced persistent threat", "state-sponsored attack", "targeted attack"

APTs are typically conducted by well-funded threat actors like nation-states or organized crime groups with specific objectives and the patience to achieve them over months or years.

Why it matters

  • APTs target high-value assets: intellectual property, state secrets, financial systems.
  • Traditional security tools often miss APTs because they blend with normal traffic.
  • The average dwell time (time before detection) can exceed 200 days.
  • Recovery from an APT can cost millions and take years.

APT lifecycle (kill chain)

  1. Reconnaissance: Gathering intelligence about the target.
  2. Initial compromise: Spear phishing, zero-day exploits, watering hole attacks.
  3. Establish foothold: Installing backdoors, creating persistence mechanisms.
  4. Escalate privileges: Moving from user to admin access.
  5. Internal recon: Mapping the network, finding valuable targets.
  6. Lateral movement: Spreading to other systems using stolen credentials.
  7. Data exfiltration: Slowly extracting data to avoid detection.
  8. Maintain presence: Staying hidden for future access.

Notable APT groups

  • APT28 (Fancy Bear): Russian state-sponsored, political targets.
  • APT29 (Cozy Bear): Russian intelligence, government espionage.
  • APT41: Chinese group, both espionage and financial crime.
  • Lazarus Group: North Korean, financial theft and sabotage.

Defense strategies

  • Defense in depth with multiple security layers.
  • Network segmentation to limit lateral movement.
  • Behavioral analytics to detect unusual patterns.
  • Threat hunting to proactively search for indicators of compromise.
  • Incident response planning for rapid containment.