An advanced persistent threat (APT) is a highly sophisticated, long-term cyberattack in which an adversary—often a well-funded, state-sponsored or state-affiliated group—gains unauthorized access to a targeted network and maintains an undetected presence for extended periods. The primary objectives of APTs are typically to steal sensitive data, conduct espionage, or undermine critical operations, rather than to cause immediate, visible damage.

APTs are characterized by:

• Advanced Techniques: Use of custom malware, zero-day exploits, and complex intrusion methods tailored to bypass security controls.
• Persistence: Attackers remain active within the network for weeks, months, or even years, continuously adapting to defenses.
• Targeted Approach: Focus on high-value organizations such as governments, critical infrastructure, defense, or large corporations.
• Stealth and Evasion: Use of encryption, obfuscation, and legitimate system tools to avoid detection.
• Multiple Attack Vectors: Exploitation of technical vulnerabilities, social engineering, and sometimes physical infiltration.

Typical stages of an APT attack include:

1. Infiltration: Gaining initial access, often through spear-phishing or exploiting vulnerabilities.
2. Escalation and Lateral Movement: Expanding access within the network, mapping systems, and gathering credentials.
3. Exfiltration: Stealthily extracting data or achieving the attack’s objectives.
APTs are distinguished from other cyberattacks by their sustained, covert, and highly coordinated nature, often involving significant resources and planning.

Synonyms:
APT