[wpdreams_ajaxsearchpro_results id=1 element='div']

What’s an APT?

[ad_1]

An advanced persistent threat is a cyber-attack that is both advanced and persistent, often sponsored by a nation or large organization. It targets a specific system for a particular purpose and can escalate to more complex software. The term originated from the US government and can refer to any ongoing cyber-attack against a large target. The use of advanced technology is not always necessary, but persistence is key to the success of the attack.

An advanced persistent threat is a type of computer threat often associated with the use of malicious computers and activities such as hacking. What differentiates this type of threat from other hacking attempts are the two main aspects of the term itself, the fact that it can be quite advanced and that these attempts are persistent. This type of threat is often sponsored by a nation or a large organization, so it has more resources and capabilities than a lone hacker or a small group. An advanced persistent threat also typically targets a particular system for a certain purpose that goes beyond basic theft or abuse of the computer.

The origins of the term “advanced persistent threat” are somewhat unclear, but it likely stemmed from a government agency or military organization in the United States. In general usage, it can refer to any type of ongoing and sustained cyber-attack against a large target, such as a country’s defense organization or a large corporation. While an advanced and persistent threat can come from any well-organized source, it typically refers to government-funded and sponsored acts of cyberterrorism or cyber-espionage. Many countries not only engage in this type of espionage but have also developed organizations and military groups responsible for defending against these types of attacks.

One of the areas of disagreement and inconsistency with regards to the name “advanced persistent threat” is in the first word: advanced. This implies that these threats use complicated or highly advanced technologies or software, which is not always the case. An advanced persistent threat can use basic types of malicious software to launch an attack against a group. How this malware is initially used and escalated, however, is what makes these threats so annoying to organizations and countries.

This largely stems from the characteristic aspect of an advanced persistent threat, that it is persistent and ongoing. While fairly simple malware may be used in an initial attack, if this is defended, the attack is likely to escalate and more complex or advanced software be used. The goal of an advanced persistent threat is usually to attack a specific system and obtain information or data that can be used in a particular way. This type of organizational drive and focus separates these attacks from other hacking attempts that might be intended to disrupt trade, and provides the impetus for continued attempts to steal sensitive data or sabotage an enemy system.

[ad_2]