APT (Advanced Persistent Threat)
What it is
An APT is a long-game, targeted attack. Skilled attackers quietly break in, move sideways through the network, and stay hidden for weeks or months to steal sensitive data—not to make noise. Think careful recon, staged break-ins, and patient data theft. Learn more in our
APT guide
.
How it works
-
Initial access: spear-phishing, stolen credentials, or a zero-day.
-
Persistence & stealth: “living off the land” tools, scheduled tasks, legit admin utilities.
-
Lateral movement: hop between systems, escalate privileges, map crown jewels.
-
Exfiltration: compress, stage, and quietly send data out.
What you might notice
-
Unusual admin logins at odd hours
-
New scheduled tasks, services, or remote connections
-
Legit tools (PowerShell, PsExec) used in suspicious ways
-
Data spikes to unknown destinations
If you suspect an APT
-
Isolate affected systems; don’t tip off the attacker with broad resets.
-
Collect evidence (logs, memory, timelines) before changes.
-
Reset creds from a clean host; rotate keys/tokens.
-
Hunt laterally—assume multiple footholds.
-
Engage IR specialists and notify stakeholders as required.
Strengthen your defenses
-
EDR/XDR + threat hunting; enable detailed logging (auth, PowerShell, DNS, proxy).
-
MFA everywhere, least privilege, and privileged access workstations.
-
Patch fast on internet-facing apps; inventory and segment critical data.
-
Email and identity security: protect against spear-phishing and token theft.
-
Practice: tabletop exercises and restore drills for backups.
Glossary (A–Z)
Related Articles
NDR (Network Detection And Response)
What it is Network Detection and Response (NDR) watches live network traffic to spot and investigate suspicious behavior in real time. Instead of relying on signatures, it analyzes patterns and anomalies to catch threats moving across your ...
Data Exfiltration
What it is Data exfiltration is the unauthorized transfer of your data out of your device or network—quietly slipping customer records, passwords, designs, or finances to an attacker. It’s the punchline of many breaches: get in, get data out, cash ...
EDR (Endpoint Detection and Response)
What it is EDR is your always-on security team for laptops and servers. It watches what’s happening on each device, spots attacks in progress, and helps you respond fast - quarantine, investigate, and clean up. For details on capabilities and use ...
Data Execution Prevention
What it is Data Execution Prevention (DEP) is a Windows safety net that stops code from running in places it shouldn’t—like the stack or heap. If malware tries to execute from those memory areas, Windows blocks it and shuts the app down instead of ...
Data Breach Prevention
Why it matters Breaches drain money, trust, and time. Strong basics turn scary “what ifs” into non-events: a phish gets ignored, a stolen password is useless, a lost laptop holds only encrypted gibberish. The short, smart checklist MFA everywhere: ...