Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Bedrohungslandschaft Glossary

APT (Advanced Persistent Threat)

An Advanced Persistent Threat (APT) is a sophisticated, long-term cyberattack—usually carried out by state-sponsored or state-backed actors—that targets a specific objective and remains undetected for months or years.

APT (Advanced Persistent Threat) refers to a category of cyberattacks characterized by three features:

  • Advanced: Sophisticated techniques, zero-day exploits, custom-made malware
  • Persistent: Long-term presence in the target network (months to years) without being detected
  • Threat: Targeted threat—usually espionage, sabotage, or preparation for future attacks

Difference from standard cybercrime

FeatureStandard attack (opportunistic)APT (targeted)
AttackerAutomated malware campaignSkilled team, often state-sponsored
TargetQuick cash (ransomware)Espionage, sabotage, long-term control
DurationMinutes to hoursMonths to years on the network
MethodologyCommodity malware, known CVEsZero-days, living-off-the-land, custom backdoors
DetectionRelatively easyVery difficult—deliberately designed for stealth

APT Groups

Security firms designate APT groups with numbers or animal names:

GroupAttributionKnown Attacks
APT28 / Fancy BearRussia (GRU)German Bundestag 2015, DNC 2016
APT29 / Cozy BearRussia (SVR)SolarWinds 2020
APT41China (dual-use)Pharmaceutical sector, telecommunications
Lazarus GroupNorth KoreaWannaCry, Sony, banks
Charming KittenIranUniversities, activists
Volt TyphoonChinaUS Critical Infrastructure

APT Kill Chain

APT attacks follow the Cyber Kill Chain—a characteristic feature is the long dwell time in Phases 5–6 before the actual attack:

Phase 1: Reconnaissance—Weeks to months of OSINT: LinkedIn, Shodan, job postings reveal technologies

Phase 2: Weaponization – Develop zero-day exploits or custom backdoors (zero-day prices: $100k–$2 million)

Phase 3: Delivery – Spear-phishing with targeted context, watering hole (compromised industry website), supply chain (SolarWinds)

Phase 4: Exploitation – Execute zero-day exploit or social engineering (macro activation)

Phase 5: Persistence (Living off the Land) - Scheduled Tasks, WMI Event Subscriptions, Registry Autoruns - no custom malware, therefore no EDR alert

Phase 6: Command & Control - C2 via legitimate cloud services (OneDrive, Google Drive), DNS Tunneling, Slow Beaconing every 8–24 hours

Phase 7: Actions on Objectives - Lateral movement, data exfiltration (slow, in small packets), sabotage

Detection

APTs are difficult to detect because they use legitimate Windows tools (PowerShell, WMI, PsExec) – Living-off-the-Land leaves no malware signatures.

Effective Detection Methods:

  • SIEM + UEBA: Correlate behavioral anomalies over extended periods (e.g., PowerShell with an encoded command from a normal user account)
  • Threat Hunting: Proactive search for Indicators of Compromise (IoCs)—e.g., LSASS access, unusual TGS requests (Kerberoasting), DCSync from non-DCs
  • Deception Technology: Honeypots and honey credentials that detect APT lateral movement
  • NDR: Network anomalies such as beaconing, DNS tunneling, exfiltration via cloud services

Who is affected?

  • Traditionally: Defense, energy, critical infrastructure, government
  • Increasingly: Pharmaceutical companies (vaccine theft), law firms
  • SMEs as entry points: "Island hopping" – SMEs are attacked to reach a larger target; 43% of all APT attacks start via a supplier (Mandiant 2024)

Detailed guide: Detecting, Defending Against, and Responding to APTs