ALERT

[TIME RUNNING OUT] Data Compliance: Avoiding the Auditor with Better Governance

Advanced Persistent Threat (APT)

Definition - What does Advanced Persistent Threat (APT) mean?

An advanced persistent threat (APT) refers to a cyberattack launched by an attacker with substantial means, organization and motivation to carry out a sustained assault against a target. An APT is advanced in the sense that it employs stealth and multiple attack methods to compromise the target, which is often a high-value corporate or government resource. The attack is difficult to detect, remove, and attribute. Once the target is breached, back doors are often created to provide the attacker with ongoing access to the compromised system. An APT is persistent because the attacker can spend months gathering intelligence about the target and use that intelligence to launch multiple attacks over an extended period of time. It is threatening because perpetrators are often after highly sensitive information, such as the layout of nuclear power plants or codes to break into U.S. defense contractors.

Techopedia explains Advanced Persistent Threat (APT)

An APT has three primary goals:

  • Theft of sensitive information from the target
  • Surveillance of the target
  • Sabotage of the target

The attacker hopes to be able to achieve its goals while remaining undetected.

Perpetrators of APTs often use trusted connections to gain access to networks and systems. The trusted connection can be a sympathetic insider or unwitting employee who falls prey to a spear phishing attack.

APTs differ from other cyberattacks in a number of ways:

  • They often use customized tools and intrusion techniques, such as vulnerability exploits, viruses, worms and rootkits, which are designed specifically to penetrate the target organization.
  • They occur over long periods of time during which the attackers move slowly and quietly to avoid detection.
  • They are designed to satisfy the requirements of espionage and/or sabotage, usually involving covert state actors.
  • They are aimed at a limited range of highly valuable targets, such as government facilities, defense contractors and manufacturers of high-tech products.
Share this:

Techopedia Deals

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
"Techopedia" on Twitter


'@Techopedia'
Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Resources
The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.