An Advanced Persistent Threat (APT) is a cyberattack campaign where a threat actor establishes a long-term presence inside a breached network to continuously steal sensitive data.
In order to evade detection throughout the entire APT attack life cycle (which could last for many years), these cyber threats must always exceed the evolving sophistication of common security controls.
The advanced attack methods of APT groups makes this cyber threat significantly more difficult to intercept.
More difficult but not impossible.
By understanding the APT attack sequence, and the subtle indicators of compromise, it is possible to mitigate and even block APT attacks.
To learn how, read on.
There are 5 characteristics that differentiate APT threats from other cyber threats.
Advanced Persistent Threats are sophisticated because they're well funded and usually coordinated by some of the most advanced hackers in the digital realm - nation-state cybercriminals.
To ensure a substantial return on the superior resource and expertise investments required to launch APT attacks, APT groups won't waste time targeting low-value victims. Their cross-hairs are fixed on the entities hosting the most valuable sensitive information or targets that will cause the greatest detriment to an adversary when compromised.
These include:
APT groups are on the hunt for the following types of data:
The preference of large enterprises doesn't mean smaller organizations aren't at risk of suffering an APT attack.
Vendors within the supply chain network of a target are vulnerable to attacks because they're usually easier to compromise and they have access to the private resources of the target organization, making them the perfect attack vectors.
Such cyber-attacks are known as Supply Chain Attacks and their convenient facilitation of backdoors to prime targets is fueling their increasing popularity.

The trend of APT attacks is expected to keep climbing. By 2025 it is estimated that the Advanced Persistent Threat market will be worth almost $12.5 billion U.S dollars.

The silver lining to this provocative trend is that enough threat intelligence has been collected to map the sequence of APT attacks.
By understanding the evolution of APT attacks, security measures can be strategically implemented at each successive stage to progressively obfuscate the success potential of these attacks.
The progression of APT attacks can be described in two dimensions - linearly and cyclically.
The linear trajectory illustrates the evolution of an APT attack through its 6 stages.

The cyclical trajectory illustrates the APT burrowing strategy of APT attacks, where attackers penetrate deeper into a network as privileged credentials are discovered and compromised.

The 6 progression stages of an APT attack are discussed below.
The prestigious entities being targeted in APT attacks have sufficient funding for sophisticated cybersecurity controls. Because of this, cyberattacks cannot begin their attack sequence with infiltration. Several reconnaissance campaigns are initially required to detect potential entry points into an organization's network.
Solutions commonly used for penetration testing and network analytics tools could clandestinely detect overlooked vulnerabilities that could facilitate an APT attack.
Some examples of such solutions are listed below. Each item links to further information.
After potential entry points have been detected, hackers then attempt exploitation to gain network access.
This process is usually an orchestrated attack targeting multiple attack vectors within quick succession.
The breach tactics that make a regular appearance in an APT attackers toolkit include:
After breaching an IT ecosystem, cybercriminals then deploy trojan malware that establishes a series of backdoor connections to criminal servers (command and control servers) to facilitate the exfiltration of sensitive data.
Once these backdoors are established, a persistent presence is achieved.
Learn more about data exfiltration.
Threat actors then move laterally along the target network looking for privileged credentials that will grant them even deeper access.
APT attackers will remain entrenched for an extended period of time monitoring network activity. When they decide to steal data, their malicious activity is hidden behind legitimate processes or obfuscated with code re-writing practices to evade detection by antivirus solutions and security teams.
When hackers discover valuable information, it's transferred through the backdoors established in stage 3 and into their servers. This usually transpires alongside legitimate network processes to mitigate suspicious network activity spikes.
If there's a risk of these transfers being intercepted by security teams, APT hackers could deploy white noise tactics like DDoS attacks to divert attention away from exfiltration processes.
White noise attacks are also deployed to distract security teams before a deeper level of the network is compromised (see figure 4 - cyclical attack lifecycle).
The 5 most popular Advance Persistent Threats include:
APT groups have established a reputation for evading even the most sophisticated of threat detection solutions.
Vigilant incident response teams and defense contractors could detect APT attack attempts by monitoring for the following key indicators:
There are 5 security controls that could prevent APT malware injections and their resulting cyberattacks. The following figure illustrates their implementation across the APT attack lifecycle.

Implementing network firewalls along the perimeter of a network is one of the best methods of detecting malicious data exfiltration and backdoor installation attempts.
Web Application Firewalls (WAF) could prevent application layer attacks against web app servers. This security control could block SQL attacks and brute force attacks - common tactics implemented during the infiltration stage of an APT attack.
Domain whitelisting allows organizations to specify which domains and applications are permitted to access private networks.
To maximize efficacy, domain whitelisting should be coupled with continuous security posture measurement for all approved domains and enforced software update policies for all permitted applications.
Multi-Factor Authentication could disrupt the lateral movement phase of an APT attack (stage 5). If all access is gated with multi-factor authentication, APT attacks will have trouble compromising privileged credentials to burrow deeper into sensitive resources.
Bolstering the security of Privileged Access Management strategies, in addition to multi-factor authentication, will make privileged escalation an exceedingly frustrating endeavor to APT attacks.
The ideal APT attack defenses are those that prevent attackers from gaining access to a network. But access points are difficult to detect across an ever-expanding attack surface.
An attack surface monitoring solution can detect software vulnerabilities, even along the most convoluted attack surface - cloud technology.
The rapid remediation that's possible with such solutions helps organizations bolster their cybersecurity exposures before they're detected by APT hackers - preventing the APT attack cycle from progressing beyond stage 1.