APT (Advanced Persistent Threat)
An Advanced Persistent Threat (APT) is a sophisticated, long-term cyberattack—usually carried out by state-sponsored or state-backed actors—that targets a specific objective and remains undetected for months or years.
APT (Advanced Persistent Threat) refers to a category of cyberattacks characterized by three features:
- Advanced: Sophisticated techniques, zero-day exploits, custom-made malware
- Persistent: Long-term presence in the target network (months to years) without being detected
- Threat: Targeted threat—usually espionage, sabotage, or preparation for future attacks
Difference from standard cybercrime
| Feature | Standard attack (opportunistic) | APT (targeted) |
|---|---|---|
| Attacker | Automated malware campaign | Skilled team, often state-sponsored |
| Target | Quick cash (ransomware) | Espionage, sabotage, long-term control |
| Duration | Minutes to hours | Months to years on the network |
| Methodology | Commodity malware, known CVEs | Zero-days, living-off-the-land, custom backdoors |
| Detection | Relatively easy | Very difficult—deliberately designed for stealth |
APT Groups
Security firms designate APT groups with numbers or animal names:
| Group | Attribution | Known Attacks |
|---|---|---|
| APT28 / Fancy Bear | Russia (GRU) | German Bundestag 2015, DNC 2016 |
| APT29 / Cozy Bear | Russia (SVR) | SolarWinds 2020 |
| APT41 | China (dual-use) | Pharmaceutical sector, telecommunications |
| Lazarus Group | North Korea | WannaCry, Sony, banks |
| Charming Kitten | Iran | Universities, activists |
| Volt Typhoon | China | US Critical Infrastructure |
APT Kill Chain
APT attacks follow the Cyber Kill Chain—a characteristic feature is the long dwell time in Phases 5–6 before the actual attack:
Phase 1: Reconnaissance—Weeks to months of OSINT: LinkedIn, Shodan, job postings reveal technologies
Phase 2: Weaponization – Develop zero-day exploits or custom backdoors (zero-day prices: $100k–$2 million)
Phase 3: Delivery – Spear-phishing with targeted context, watering hole (compromised industry website), supply chain (SolarWinds)
Phase 4: Exploitation – Execute zero-day exploit or social engineering (macro activation)
Phase 5: Persistence (Living off the Land) - Scheduled Tasks, WMI Event Subscriptions, Registry Autoruns - no custom malware, therefore no EDR alert
Phase 6: Command & Control - C2 via legitimate cloud services (OneDrive, Google Drive), DNS Tunneling, Slow Beaconing every 8–24 hours
Phase 7: Actions on Objectives - Lateral movement, data exfiltration (slow, in small packets), sabotage
Detection
APTs are difficult to detect because they use legitimate Windows tools (PowerShell, WMI, PsExec) – Living-off-the-Land leaves no malware signatures.
Effective Detection Methods:
- SIEM + UEBA: Correlate behavioral anomalies over extended periods (e.g., PowerShell with an encoded command from a normal user account)
- Threat Hunting: Proactive search for Indicators of Compromise (IoCs)—e.g., LSASS access, unusual TGS requests (Kerberoasting), DCSync from non-DCs
- Deception Technology: Honeypots and honey credentials that detect APT lateral movement
- NDR: Network anomalies such as beaconing, DNS tunneling, exfiltration via cloud services
Who is affected?
- Traditionally: Defense, energy, critical infrastructure, government
- Increasingly: Pharmaceutical companies (vaccine theft), law firms
- SMEs as entry points: "Island hopping" – SMEs are attacked to reach a larger target; 43% of all APT attacks start via a supplier (Mandiant 2024)
Detailed guide: Detecting, Defending Against, and Responding to APTs