Definitions of precisely what an APT is can vary, but can be summarized by their named requirements below:
Numerous sources have alleged that some APT groups are affiliated with, or are agents of, governments of sovereign states.
Businesses holding a large quantity of personally identifiable information are at high risk of being targeted by advanced persistent threats, including:
A Bell Canada study provided deep research into the anatomy of APTs and uncovered widespread presence in Canadian government and critical infrastructure. Attribution was established to Chinese and Russian actors.
Actors behind advanced persistent threats create a growing and changing risk to organizations' financial assets, intellectual property, and reputation by following a continuous process or kill chain:
In 2013, Mandiant presented results of their research on alleged Chinese attacks using APT method between 2004 and 2013 that followed similar lifecycle:
In incidents analysed by Mandiant, the average period over which the attackers controlled the victim's network was one year, with longest – almost five years. The infiltrations were allegedly performed by Shanghai-based Unit 61398 of People's Liberation Army. Chinese officials have denied any involvement in these attacks.
Previous reports from Secdev had previously discovered and implicated Chinese actors.
There are tens of millions of malware variations, which makes it extremely challenging to protect organizations from APT. While APT activities are stealthy and hard to detect, the command and control network traffic associated with APT can be detected at the network layer level with sophisticated methods. Deep log analyses and log correlation from various sources is of limited usefulness in detecting APT activities. It is challenging to separate noises from legitimate traffic. Traditional security technology and methods have been ineffective in detecting or mitigating APTs. Active cyber defense has yielded greater efficacy in detecting and prosecuting APTs (find, fix, finish) when applying cyber threat intelligence to hunt and adversary pursuit activities. Human-Introduced Cyber Vulnerabilities (HICV) are a weak cyber link that are neither well understood nor mitigated, constituting a significant attack vector.
Multiple organizations may assign different names to the same actor. As separate researchers could each have their own varying assessments of an APT group, companies such as CrowdStrike, Kaspersky, Mandiant, and Microsoft, among others, have their own internal naming schemes. Names between different organizations may refer to overlapping but ultimately different groups, based on various data gathered.
CrowdStrike assigns animals by nation-state or other category, such as "Kitten" for Iran and "Spider" for groups focused on cybercrime. Other companies have named groups based on this system — Rampant Kitten, for instance, was named by Check Point rather than CrowdStrike.
Dragos bases its names for APT groups on minerals.
Mandiant assigns numbered acronyms in three categories, APT, FIN, and UNC, resulting in APT names like FIN7. Other companies using a similar system include Proofpoint (TA) and IBM (ITG and Hive).
"What Is an Advanced Persistent Threat (APT)?". www.kaspersky.com. Archived from the original on 22 March 2021. Retrieved 11 August 2019. https://www.kaspersky.com/resource-center/definitions/advanced-persistent-threats
"What Is an Advanced Persistent Threat (APT)?". Cisco. Archived from the original on 22 March 2021. Retrieved 11 August 2019. https://www.cisco.com/c/en/us/products/security/advanced-persistent-threat.html
Maloney, Sarah. "What is an Advanced Persistent Threat (APT)?". Archived from the original on 7 April 2019. Retrieved 9 November 2018. https://www.cybereason.com/blog/advanced-persistent-threat-apt
Cole., Eric (2013). Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization. Syngress. OCLC 939843912. /wiki/OCLC_(identifier)
"M-Trends Cyber Security Trends". FireEye. Archived from the original on 21 September 2021. Retrieved 11 August 2019. https://www.fireeye.com/current-threats/annual-threat-report/mtrends.html
"Cyber Threats to the Financial Services and Insurance Industries" (PDF). FireEye. Archived from the original (PDF) on 11 August 2019. https://web.archive.org/web/20190811091624/https://www.fireeye.com/content/dam/fireeye-www/solutions/pdfs/ib-finance.pdf
"Cyber Threats to the Retail and Consumer Goods Industry" (PDF). FireEye. Archived from the original (PDF) on 11 August 2019. https://web.archive.org/web/20190811091947/https://www.fireeye.com/content/dam/fireeye-www/global/en/solutions/pdfs/ib-retail-consumer.pdf
"Advanced Persistent Threats: A Symantec Perspective" (PDF). Symantec. Archived from the original (PDF) on 8 May 2018. https://web.archive.org/web/20180508161501/https://www.symantec.com/content/en/us/enterprise/white_papers/b-advanced_persistent_threats_WP_21215957.en-us.pdf
Au, Man Ho (2018). "Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat". Future Generation Computer Systems. 79: 337–349. doi:10.1016/j.future.2017.06.021. /wiki/Doi_(identifier)
"M-Trends Cyber Security Trends". FireEye. Archived from the original on 21 September 2021. Retrieved 11 August 2019. https://www.fireeye.com/current-threats/annual-threat-report/mtrends.html
Maloney, Sarah. "What is an Advanced Persistent Threat (APT)?". Archived from the original on 7 April 2019. Retrieved 9 November 2018. https://www.cybereason.com/blog/advanced-persistent-threat-apt
"Advanced Persistent Threats (APTs)". IT Governance. Archived from the original on 11 August 2019. Retrieved 11 August 2019. https://www.itgovernance.co.uk/advanced-persistent-threats-apt
"Advanced persistent Threat Awareness" (PDF). TrendMicro Inc. Archived (PDF) from the original on 10 June 2016. Retrieved 11 August 2019. https://www.trendmicro.co.uk/media/misc/apt-survey-report-en.pdf
"Advanced Persistent Threats (APTs)". IT Governance. Archived from the original on 11 August 2019. Retrieved 11 August 2019. https://www.itgovernance.co.uk/advanced-persistent-threats-apt
"Explained: Advanced Persistent Threat (APT)". Malwarebytes Labs. 26 July 2016. Archived from the original on 9 May 2019. Retrieved 11 August 2019. https://blog.malwarebytes.com/101/2016/07/explained-advanced-persistent-threat-apt/
Maloney, Sarah. "What is an Advanced Persistent Threat (APT)?". Archived from the original on 7 April 2019. Retrieved 9 November 2018. https://www.cybereason.com/blog/advanced-persistent-threat-apt
"Advanced Persistent Threats (APTs)". IT Governance. Archived from the original on 11 August 2019. Retrieved 11 August 2019. https://www.itgovernance.co.uk/advanced-persistent-threats-apt
"Assessing Outbound Traffic to Uncover Advanced Persistent Threat" (PDF). SANS Technology Institute. Archived from the original (PDF) on 26 June 2013. Retrieved 14 April 2013. https://web.archive.org/web/20130626233122/https://www.sans.edu/student-files/projects/JWP-Binde-McRee-OConnor.pdf
"Introducing Forrester's Cyber Threat Intelligence Research". Forrester Research. Archived from the original on 15 April 2014. Retrieved 14 April 2014. https://web.archive.org/web/20140415054512/http://blogs.forrester.com/rick_holland/13-02-14-introducing_forresters_cyber_threat_intelligence_research
Beim, Jared (2018). "Enforcing a Prohibition on International Espionage". Chicago Journal of International Law. 18: 647–672. ProQuest 2012381493. Archived from the original on 22 May 2021. Retrieved 18 January 2023. https://www.proquest.com/docview/2012381493
"Advanced Persistent Threats: Learn the ABCs of APTs - Part A". SecureWorks. Archived from the original on 7 April 2019. Retrieved 23 January 2017. https://www.secureworks.com/blog/advanced-persistent-threats-apt-a
Olavsrud, Thor (30 April 2012). "Targeted Attacks Increased, Became More Diverse in 2011". CIO Magazine. Archived from the original on 14 April 2021. Retrieved 14 April 2021. https://web.archive.org/web/20210414115711/https://www.cio.com/article/2396583/targeted-attacks-increased--became-more-diverse-in-2011.html
"An Evolving Crisis". BusinessWeek. 10 April 2008. Archived from the original on 10 January 2010. Retrieved 20 January 2010. https://web.archive.org/web/20100110120647/http://www.businessweek.com/magazine/content/08_16/b4080032220668.htm
"The New E-spionage Threat". BusinessWeek. 10 April 2008. Archived from the original on 18 April 2011. Retrieved 19 March 2011. https://web.archive.org/web/20110418080952/http://www.businessweek.com/magazine/content/08_16/b4080032218430.htm
Rosenbach, Marcel; Schulz, Thomas; Wagner, Wieland (19 January 2010). "Google Under Attack: The High Cost of Doing Business in China". Der Spiegel. Archived from the original on 21 January 2010. Retrieved 20 January 2010. https://www.spiegel.de/international/world/google-under-attack-the-high-cost-of-doing-business-in-china-a-672742.html
"Commander Discusses a Decade of DOD Cyber Power". U.S. DEPARTMENT OF DEFENSE. Archived from the original on 19 September 2020. Retrieved 28 August 2020. https://www.defense.gov/News/News-Stories/Article/Article/2193130/commander-discusses-a-decade-of-dod-cyber-power/
"Under Cyberthreat: Defense Contractors". Bloomberg.com. BusinessWeek. 6 July 2009. Archived from the original on 11 January 2010. Retrieved 20 January 2010. https://www.bloomberg.com/news/articles/2009-07-06/under-cyberthreat-defense-contractorsbusinessweek-business-news-stock-market-and-financial-advice
"Understanding the Advanced Persistent Threat". Tom Parker. 4 February 2010. Archived from the original on 18 February 2010. Retrieved 4 February 2010. http://tominfosec.blogspot.com/2010/02/understanding-apt.html
"Advanced Persistent Threat (or Informationized Force Operations)" (PDF). Usenix, Michael K. Daly. 4 November 2009. Archived (PDF) from the original on 11 May 2021. Retrieved 4 November 2009. https://www.usenix.org/legacy/event/lisa09/tech/slides/daly.pdf
"Anatomy of an Advanced Persistent Threat (APT)". Dell SecureWorks. Archived from the original on 5 March 2016. Retrieved 21 May 2012. https://web.archive.org/web/20160305025719/https://www.secureworks.com/resources/sb-advanced-threat-protection-with-dell-secureworks
Gonzalez, Joaquin Jay III; Kemp, Roger L. (16 January 2019). Cybersecurity: Current Writings on Threats and Protection. McFarland. p. 69. ISBN 978-1-4766-7440-7. 978-1-4766-7440-7
Ingerman, Bret; Yang, Catherine (31 May 2011). "Top-Ten IT Issues, 2011". Educause Review. Archived from the original on 14 April 2021. Retrieved 14 April 2021. https://er.educause.edu/articles/2011/5/topten-it-issues-2011
McMahon, Dave; Rohozinski, Rafal. "The Dark Space Project: Defence R&D Canada – Centre for Security Science Contractor Report DRDC CSS CR 2013-007" (PDF). publications.gc.ca. Archived (PDF) from the original on 5 November 2016. Retrieved 1 April 2021. http://publications.gc.ca/collections/collection_2016/rddc-drdc/D68-3-007-2013-eng.pdf
"Outmaneuvering Advanced and Evasive Malware Threats". Secureworks. Secureworks Insights. Archived from the original on 7 April 2019. Retrieved 24 February 2016. https://web.archive.org/web/20190407232258/https://www.secureworks.com/resources/wp-outmaneuvering-advanced-and-evasive-malware-threats
"APT1: Exposing One of China's Cyber Espionage Units". Mandiant. 2013. Archived from the original on 2 February 2015. Retrieved 19 February 2013. https://web.archive.org/web/20150202015751/http://intelreport.mandiant.com/
"What are MITRE ATT&CK initial access techniques". GitGuardian - Automated Secrets Detection. 8 June 2021. Archived from the original on 29 November 2023. Retrieved 13 October 2023. https://blog.gitguardian.com/inital-access-techniques/
"APT1: Exposing One of China's Cyber Espionage Units". Mandiant. 2013. Archived from the original on 2 February 2015. Retrieved 19 February 2013. https://web.archive.org/web/20150202015751/http://intelreport.mandiant.com/
Blanchard, Ben (19 February 2013). "China says U.S. hacking accusations lack technical proof". Reuters. Archived from the original on 14 April 2021. Retrieved 14 April 2021. https://www.reuters.com/article/us-china-hacking-idUSBRE91I06120130220
Deibert, R.; Rohozinski, R.; Manchanda, A.; Villeneuve, N.; Walton, G (28 March 2009). "Tracking GhostNet: investigating a cyber espionage network". The Munk Centre for International Studies, University of Toronto. Archived from the original on 27 December 2023. Retrieved 27 December 2023. https://ora.ox.ac.uk/objects/uuid:6d1260fd-b8ee-4a11-8a5f-e7708d543651
RicMessier (30 October 2013). GSEC GIAC Security Essentials Certification All. McGraw Hill Professional, 2013. p. xxv. ISBN 978-0-07-182091-2. 978-0-07-182091-2
"Anatomy of an APT (Advanced Persistent Threat) Attack". FireEye. Archived from the original on 7 November 2020. Retrieved 14 November 2020. https://www.fireeye.com/current-threats/anatomy-of-a-cyber-attack.html
"Threat Intelligence in an Active Cyber Defense (Part 1)". Recorded Future. 18 February 2015. Archived from the original on 20 June 2021. Retrieved 10 March 2021. https://web.archive.org/web/20210620155903/https://www.recordedfuture.com/active-cyber-defense-part-1/
"Threat Intelligence in an Active Cyber Defense (Part 2)". Recorded Future. 24 February 2015. Archived from the original on 27 February 2021. Retrieved 10 March 2021. https://web.archive.org/web/20210227120734/https://www.recordedfuture.com/active-cyber-defense-part-2/
"A Context-Centred Research Approach to Phishing and Operational Technology in Industrial Control Systems | Journal of Information Warfare". www.jinfowar.com. Archived from the original on 31 July 2021. Retrieved 31 July 2021. https://www.jinfowar.com/journal/volume-18-issue-4/context-centred-research-approach-phishing-operational-technology-industrial-control-systems
"Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak". Symantec. 7 May 2019. Archived from the original on 7 May 2019. Retrieved 23 July 2019. https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/buckeye-windows-zero-day-exploit
"APT17: Hiding in Plain Sight - FireEye and Microsoft Expose Obfuscation Tactic" (PDF). FireEye. May 2015. Archived (PDF) from the original on 24 November 2023. Retrieved 21 January 2024. https://www2.fireeye.com/rs/fireye/images/APT17_Report.pdf
"China-Based Threat Actors" (PDF). U.S. Department of Health and Human Services Office of Information Security. 16 August 2023. Archived (PDF) from the original on 29 December 2023. Retrieved 29 April 2024. https://www.hhs.gov/sites/default/files/china-based-threat-actor-profiles-tlpclear.pdf
van Dantzig, Maarten; Schamper, Erik (19 December 2019). "Wocao APT20" (PDF). fox-it.com. NCC Group. Archived from the original (PDF) on 22 March 2021. Retrieved 23 December 2019. https://web.archive.org/web/20210322014904/https://resources.fox-it.com/rs/170-CAK-271/images/201912_Report_Operation_Wocao.pdf
Vijayan, Jai (19 December 2019). "China-Based Cyber Espionage Group Targeting Orgs in 10 Countries". www.darkreading.com. Dark Reading. Archived from the original on 7 May 2021. Retrieved 12 January 2020. https://www.darkreading.com/attacks-breaches/china-based-cyber-espionage-group-targeting-orgs-in-10-countries/d/d-id/1336676
Barth, Bradley (16 March 2016). "'Suckfly' in the ointment: Chinese APT group steals code-signing certificates". SC Media. Archived from the original on 24 September 2024. Retrieved 24 September 2024. https://www.scworld.com/brief/suckfly-in-the-ointment-chinese-apt-group-steals-code-signing-certificates
"Building China's Comac C919 airplane involved a lot of hacking, report says". ZDNET. Archived from the original on 15 November 2019. Retrieved 24 September 2024. https://www.zdnet.com/article/building-chinas-comac-c919-airplane-involved-a-lot-of-hacking-report-says/
Lyngaas, Sean (10 August 2021). "Chinese hackers posed as Iranians to breach Israeli targets, FireEye says". www.cyberscoop.com. Archived from the original on 29 November 2023. Retrieved 15 August 2021. https://www.cyberscoop.com/china-israel-iran-fireeye-hacking/
Lyngaas, Sean (12 February 2019). "Right country, wrong group? Researchers say it wasn't APT10 that hacked Norwegian software firm". www.cyberscoop.com. Cyberscoop. Archived from the original on 7 May 2021. Retrieved 16 October 2020. https://www.cyberscoop.com/apt10-apt31-recorded-future-rapid7-china/
Lyngaas, Sean (16 October 2020). "Google offers details on Chinese hacking group that targeted Biden campaign". Cyberscoop. Archived from the original on 7 May 2021. Retrieved 16 October 2020. https://www.cyberscoop.com/biden-chinese-hacking-google-security-russia/
"How Microsoft names threat actors". Microsoft. 16 January 2024. Archived from the original on 10 July 2024. Retrieved 21 January 2024. https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming
"Treasury Sanctions China-Linked Hackers for Targeting U.S. Critical Infrastructure". U.S. Department of the Treasury. 19 March 2024. Archived from the original on 25 March 2024. Retrieved 25 March 2024. https://home.treasury.gov/news/press-releases/jy2205
"Double Dragon APT41, a dual espionage and cyber crime operation". FireEye. 16 October 2019. Archived from the original on 7 May 2021. Retrieved 14 April 2020. https://web.archive.org/web/20210507025313/https://content.fireeye.com/apt-41/rpt-apt41/
"Bureau names ransomware culprits". Taipei Times. 17 May 2020. Archived from the original on 22 March 2021. Retrieved 22 May 2020. https://www.taipeitimes.com/News/taiwan/archives/2020/05/17/2003736564
Greenberg, Andy (6 August 2020). "Chinese Hackers Have Pillaged Taiwan's Semiconductor Industry". Wired. ISSN 1059-1028. Archived from the original on 22 March 2021. Retrieved 14 July 2024. /wiki/Andy_Greenberg
Sabin, Sam (26 October 2022). "New pro-China disinformation campaign targets 2022 elections: Report". Axios. Archived from the original on 26 October 2022. Retrieved 27 October 2022. https://www.axios.com/2022/10/26/disinformation-campaign-midterms-china-dragonbridge-mandiant
Milmo, Dan (5 April 2024). "China will use AI to disrupt elections in the US, South Korea and India, Microsoft warns". The Guardian. ISSN 0261-3077. Archived from the original on 25 May 2024. Retrieved 7 April 2024. https://www.theguardian.com/technology/2024/apr/05/china-using-ai-disrupt-elections
Naraine, Ryan (2 March 2021). "Microsoft: Multiple Exchange Server Zero-Days Under Attack by Chinese Hacking Group". securityweek.com. Wired Business Media. Archived from the original on 6 July 2023. Retrieved 3 March 2021. https://www.securityweek.com/microsoft-4-exchange-server-zero-days-under-attack-chinese-apt-group
Burt, Tom (2 March 2021). "New nation-state cyberattacks". blogs.microsoft.com. Microsoft. Archived from the original on 2 March 2021. Retrieved 3 March 2021. https://blogs.microsoft.com/on-the-issues/2021/03/02/new-nation-state-cyberattacks/
Nichols, Shaun (20 October 2021). "'LightBasin' hackers spent 5 years hiding on telco networks". TechTarget. Archived from the original on 29 November 2023. Retrieved 8 April 2022. https://www.techtarget.com/searchsecurity/news/252508413/LightBasin-hackers-spent-5-years-hiding-on-telco-networks
Ilascu, Ionut (19 October 2021). "LightBasin hacking group breaches 13 global telecoms in two years". Bleeping Computer. Archived from the original on 24 July 2023. Retrieved 8 April 2022. https://www.bleepingcomputer.com/news/security/lightbasin-hacking-group-breaches-13-global-telecoms-in-two-years/
Cimpanu, Catalin. "Hackers target the air-gapped networks of the Taiwanese and Philippine military". ZDnet. Archived from the original on 22 March 2021. Retrieved 16 May 2020. https://www.zdnet.com/article/hackers-target-the-air-gapped-networks-of-the-taiwanese-and-philippine-military/
Intelligence, Microsoft Threat (24 May 2023). "Volt Typhoon targets US critical infrastructure with living-off-the-land techniques". Microsoft Security Blog. Archived from the original on 17 January 2024. Retrieved 26 May 2023. https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
Tucker, Eric (18 September 2024). "FBI disrupts Chinese cyber operation targeting critical infrastructure in the US". Associated Press. Archived from the original on 24 September 2024. Retrieved 18 September 2024. https://apnews.com/article/fbi-justice-department-chinese-hacking-84e16185ae16367443a5e083adb74c8c
"Disrupting malicious uses of AI by state-affiliated threat actors". 14 February 2024. Archived from the original on 16 February 2024. Retrieved 16 February 2024. https://openai.com/blog/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors
"Staying ahead of threat actors in the age of AI". Microsoft. 14 February 2024. Archived from the original on 16 February 2024. Retrieved 16 February 2024. https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai
"Disrupting malicious uses of AI by state-affiliated threat actors". 14 February 2024. Archived from the original on 16 February 2024. Retrieved 16 February 2024. https://openai.com/blog/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors
"Staying ahead of threat actors in the age of AI". Microsoft. 14 February 2024. Archived from the original on 16 February 2024. Retrieved 16 February 2024. https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai
Krouse, Sarah; McMillan, Robert; Volz, Dustin (25 September 2024). "China-Linked Hackers Breach U.S. Internet Providers in New 'Salt Typhoon' Cyberattack". The Wall Street Journal. Archived from the original on 7 October 2024. Retrieved 25 September 2024. https://www.wsj.com/politics/national-security/china-cyberattack-internet-providers-260bd835
Krouse, Sarah; Volz, Dustin; Viswanatha, Aruna; McMillan, Robert (5 October 2024). "U.S. Wiretap Systems Targeted in China-Linked Hack". The Wall Street Journal. Archived from the original on 5 October 2024. Retrieved 5 October 2024. https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b
Sabin, Sam (19 November 2024). "New China-linked telco attackers". Axios. Retrieved 19 November 2024. https://www.axios.com/2024/11/19/exclusive-new-china-linked-telco-attackers-codebook
Yamaguchi, Mari (8 January 2025). "Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data". Associated Press. Archived from the original on 8 January 2025. Retrieved 8 January 2025. https://apnews.com/article/japan-police-cyberattack-china-government-68adcb293b2931da4c30ca0279720124
Rajagopalan, Megha (19 June 2025). "China Is Hacking Russia to Steal War Secrets". The New York Times. ISSN 0362-4331. Retrieved 20 June 2025. /wiki/Megha_Rajagopalan
Montalbano, Elizabeth (1 September 2020). "Pioneer Kitten APT Sells Corporate Network Access". Threat Post. Archived from the original on 22 March 2021. Retrieved 3 September 2020. https://threatpost.com/pioneer-kitten-apt-sells-corporate-network-access/158833/
"APT39, ITG07, Chafer, Remix Kitten, Group G0087 | MITRE ATT&CK®". attack.mitre.org. Archived from the original on 30 December 2022. Retrieved 30 December 2022. https://attack.mitre.org/groups/G0087/
"Crowdstrike Global Threat Report 2020" (PDF). crowdstrike.com. 2020. Archived (PDF) from the original on 14 March 2020. Retrieved 30 December 2020. https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf
Kyle Alspach (4 February 2022). "Microsoft discloses new details on Russian hacker group Gamaredon". VentureBeat. Archived from the original on 6 February 2022. Retrieved 22 March 2022. https://venturebeat.com/2022/02/04/microsoft-discloses-new-details-on-russian-hacker-group-gamaredon/
active since 2013, unlike most APTs, Gamaredon broadly targets all users all over the globe (in addition to also focusing on certain victims, especially Ukrainian organizations[74]) and appears to provide services for other APTs.[75] For example, the InvisiMole threat group has attacked select systems that Gamaredon had earlier compromised and fingerprinted.[74] /wiki/Ukraine
"Adversary: Venomous Bear - Threat Actor". Crowdstrike Adversary Universe. Retrieved 22 March 2022. https://adversary.crowdstrike.com/en-US/adversary/venomous-bear/
Warren Mercer; Paul Rascagneres; Vitor Ventura (29 June 2020). "PROMETHIUM extends global reach with StrongPity3 APT". Cisco. Archived from the original on 22 March 2022. Retrieved 22 March 2022. https://blog.talosintelligence.com/2020/06/promethium-extends-with-strongpity3.html
"Equation: The Death Star of Malware Galaxy". Kaspersky Lab. 16 February 2015. Archived from the original on 11 July 2019. Retrieved 23 July 2019. https://securelist.com/equation-the-death-star-of-malware-galaxy/68750/
Gallagher, Sean (3 October 2019). "Kaspersky finds Uzbekistan hacking op… because group used Kaspersky AV". arstechnica.com. Ars Technica. Archived from the original on 22 March 2021. Retrieved 5 October 2019. https://arstechnica.com/information-technology/2019/10/kaspersky-finds-uzbekistan-hacking-opbecause-they-used-kaspersky-av/
Panda, Ankit. "Offensive Cyber Capabilities and Public Health Intelligence: Vietnam, APT32, and COVID-19". thediplomat.com. The Diplomat. Archived from the original on 22 March 2021. Retrieved 29 April 2020. https://thediplomat.com/2020/04/offensive-cyber-capabilities-and-public-health-intelligence-vietnam-apt32-and-covid-19/
Tanriverdi, Hakan; Zierer, Max; Wetter, Ann-Kathrin; Biermann, Kai; Nguyen, Thi Do (8 October 2020). Nierle, Verena; Schöffel, Robert; Wreschniok, Lisa (eds.). "Lined up in the sights of Vietnamese hackers". Bayerischer Rundfunk. Archived from the original on 22 March 2021. Retrieved 11 October 2020. In Bui's case the traces lead to a group presumably acting on behalf of the Vietnamese state. Experts have many names for this group: APT 32 and Ocean Lotus are best known. In conversations with a dozen of information security specialists, they all agreed that this is a Vietnamese group spying, in particular, on its own compatriots. https://web.br.de/interaktiv/ocean-lotus/en/
"APT Attacks Trace To India, Researcher Says". www.darkreading.com. Retrieved 28 April 2025. https://www.darkreading.com/cyberattacks-data-breaches/apt-attacks-trace-to-india-researcher-says
BushidoToken (20 May 2022). "Threat Group Naming Schemes In Cyber Threat Intelligence". Curated Intelligence. Archived from the original on 8 December 2023. Retrieved 21 January 2024. https://www.curatedintel.org/2022/05/threat-group-naming-schemes-in-cyber.html
"CrowdStrike 2023 Global Threat Report" (PDF). CrowdStrike. Archived (PDF) from the original on 26 March 2024. Retrieved 21 January 2024. https://iitd.com.ua/wp-content/uploads/2023/03/crowdstrike2023globalthreatreport.pdf
"Rampant Kitten". Thailand Electronic Transactions Development Agency. Archived from the original on 29 November 2022. Retrieved 21 January 2024. https://apt.etda.or.th/cgi-bin/showcard.cgi?g=Rampant%20Kitten
BushidoToken (20 May 2022). "Threat Group Naming Schemes In Cyber Threat Intelligence". Curated Intelligence. Archived from the original on 8 December 2023. Retrieved 21 January 2024. https://www.curatedintel.org/2022/05/threat-group-naming-schemes-in-cyber.html
BushidoToken (20 May 2022). "Threat Group Naming Schemes In Cyber Threat Intelligence". Curated Intelligence. Archived from the original on 8 December 2023. Retrieved 21 January 2024. https://www.curatedintel.org/2022/05/threat-group-naming-schemes-in-cyber.html
Lambert, John (18 April 2023). "Microsoft shifts to a new threat actor naming taxonomy". Microsoft. Archived from the original on 22 January 2024. Retrieved 21 January 2024. https://www.microsoft.com/en-us/security/blog/2023/04/18/microsoft-shifts-to-a-new-threat-actor-naming-taxonomy/