Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 057

APT Group

What is APT Group?

APT GroupA named, tracked threat actor (usually state-sponsored) that conducts targeted, long-term, well-resourced intrusion campaigns against specific organisations or sectors.


APT (Advanced Persistent Threat) groups are persistent, well-resourced adversaries identified by a numeric or thematic label and tracked over years by vendors and governments. Examples include APT1 / Comment Crew (China, PLA Unit 61398), APT28 / Fancy Bear (Russia GRU), APT29 / Cozy Bear (Russia SVR), APT41 (China dual espionage/financial), Lazarus Group / APT38 (North Korea), and Equation Group (US-linked). Each profile is built from consistent TTPs, malware families, infrastructure, victimology, and code reuse. APT campaigns commonly chain spear-phishing, supply-chain compromises, zero-days, custom implants, and stealthy lateral movement. Mandiant's APT, CrowdStrike's adversary names, Microsoft's weather names, and Recorded Future's TAGs all reference overlapping clusters under different conventions.

Examples

  1. 01

    APT28 (GRU 26165) was linked to the 2016 DNC hack, the WADA leaks, and multiple campaigns against political organisations.

  2. 02

    APT41 was indicted by US authorities in 2020 for espionage and financially motivated intrusions across more than 14 countries.

Frequently asked questions

What is APT Group?

A named, tracked threat actor (usually state-sponsored) that conducts targeted, long-term, well-resourced intrusion campaigns against specific organisations or sectors. It belongs to the Defense & Operations category of cybersecurity.

What does APT Group mean?

A named, tracked threat actor (usually state-sponsored) that conducts targeted, long-term, well-resourced intrusion campaigns against specific organisations or sectors.

How does APT Group work?

APT (Advanced Persistent Threat) groups are persistent, well-resourced adversaries identified by a numeric or thematic label and tracked over years by vendors and governments. Examples include APT1 / Comment Crew (China, PLA Unit 61398), APT28 / Fancy Bear (Russia GRU), APT29 / Cozy Bear (Russia SVR), APT41 (China dual espionage/financial), Lazarus Group / APT38 (North Korea), and Equation Group (US-linked). Each profile is built from consistent TTPs, malware families, infrastructure, victimology, and code reuse. APT campaigns commonly chain spear-phishing, supply-chain compromises, zero-days, custom implants, and stealthy lateral movement. Mandiant's APT, CrowdStrike's adversary names, Microsoft's weather names, and Recorded Future's TAGs all reference overlapping clusters under different conventions.

How do you defend against APT Group?

Defences for APT Group typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for APT Group?

Common alternative names include: Advanced Persistent Threat group.

Related terms

See also