Advanced persistent threat (APT) is a military term for prolonged and targeted cyber attack in which an attacker gains access to a network and remains undetected for an extended period. The intention of an APT attack is to monitor networks activities and steal the data and not to cause damage to the network or organization.
Advanced Persistent Threat (APT) are attacks that gain an unauthorized foothold for executing an extended, continues attack over a long period of time using a variety of tools to achieve a single and specific malicious objective.
Mostly APT attacks target organizations in sectors such as national defense, manufacturing and the financial industry, as these organizations deal with high-value data, including intellectual property, military secrets, and data from governments and enterprise organizations.
The goal of most APT attacks is to maintain ongoing access to the targeted network rather than to get in and get out quickly, because a great deal of effort and resources usually go into carrying out APT attacks, hackers typically target high-value targets, such as nation-states and large corporations, for stealing information over a period.
APTs take a sequential approach to gain and maintain ongoing access to a targeted network.
Unlike ordinary cyberattacks, advanced persistent threats ( APT) are carried out thru methods that have been customized to the target rather than with general tools which may be better suited to target a large number of victims.
Advanced persistent threat exhibit some characteristics reflecting the precision of the planning and coordination necessary for high-value targets.
Most APTs are carried out in multiple phases, reflecting the same basic sequence of gaining access, maintaining and expanding access, and try to remain undetected in the network until the goals of the attack have been achieved.
Advanced persistent threat are identified by their intention to have multiple points of entry, which allows them to have the access even when the attack is identified, and a counter-response is triggered.