These attackers actively manage their attack once they have a foothold in a network and are usually seeking information, proprietary or economic, rather than simple financial data. APTs are persistent in that the attackers may remain on a network for some time. APTs should not be confused with botnets, which are usually opportunistic and indiscriminate attacks seeking any available victim rather than specific information.
Back to Security Threats A-Z
Back to Threatsaurus Home