Infosec glossary entry

APT

APT:
Advanced Persistent Threat

An Advanced Persistent Threat (APT) refers to a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period of time. APT attacks are typically carried out by highly skilled and well-funded adversaries, such as nation-states or organized criminal groups, who aim to steal sensitive data, disrupt operations, or gain strategic advantages. The term "advanced" indicates the sophisticated techniques used to exploit vulnerabilities, while "persistent" highlights the attackers’ determination to maintain access and achieve their objectives over time.

APT attacks often involve multiple stages, including reconnaissance, initial compromise, lateral movement within the network, and data exfiltration. Unlike traditional cyberattacks that may be opportunistic and short-lived, APTs are characterized by their strategic planning and execution, making them particularly dangerous for organizations. Effective defense against APTs requires a comprehensive security approach, including continuous monitoring and threat intelligence (see TTP).


An adversary with sophisticated levels of expertise and significant resources, allowing it through the use of multiple different attack vectors (e.g., cyber, physical, and deception) to generate opportunities to achieve its objectives, which are typically to establish and extend footholds within the information technology infrastructure of organizations for purposes of continually exfiltrating information and/or to undermine or impede critical aspects of a mission, program, or organization, or place itself in a position to do so in the future;
https://csrc.nist.gov/glossary/term/advanced_persistent_threat

Related entries

By jean-christoph

February 19, 2022

cybercrime, nation state
Leave a Reply

Your email address will not be published. Required fields are marked

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

this might interest you as well