Glossary  /  Threats

Glossary

What is an APT?

An Advanced Persistent Threat (APT) is a long-running, well-resourced adversary — almost always state-sponsored or state-aligned — that targets specific organisations over months or years rather than going after volume.

Decoding the acronym

How APTs differ from ransomware crews

Ransomware groups are loud. They want the encryption to fire and the leak site to fill up so the victim pays. APTs are quiet. They want to read your email for three years without anyone noticing. Same vocabulary — phishing, lateral movement, credential theft — but completely different objectives:

The naming chaos

Every vendor names APTs differently. The same group might be called:

MITRE ATT&CK maintains an aliases list, but the naming inconsistency is a real friction in day-to-day work. Most CTI platforms normalise across naming schemes so a search for one name returns reporting that uses any of the others.

Common attribution buckets

Attribution is hard. Public CTI assigns "with moderate confidence" because hard attribution requires evidence most CTI shops never see. Treat attribution claims as probabilistic, not absolute — especially the early ones.

What CTI teams care about

Not every organisation is an APT target. Defence contractors, critical infrastructure, government, large finance, and high-IP tech firms are. If you're in one of those sectors, tracking the APTs known to target your sector — their TTPs, their preferred CVEs, their malware families — is table stakes. Threat hunting against APT TTPs is how mature teams find dwelling adversaries.

See it in the live feed.

Concepts on this page show up in the platform every day. Sign up free to see them in action.