A highly skilled and resourceful threat actor that employs a variety of attack methods over an extended period to achieve their goals within a targeted organization’s systems. Their objectives are to gain access, maintain presence, and exfiltrate sensitive data while evading detection. An advanced persistent threat:
- Relentlessly pursues their mission objectives over a long duration by adapting techniques to counter defenses.
- Leverages cyber, physical, and deception attacks to exploit multiple vulnerabilities across IT infrastructure.
- Seeks to establish footholds to compromise critical assets and gain control to enable future malicious activity.
- Is determined to sustain engagement and necessary interaction to accomplish their mission.