What do "advanced" and "persistent" actually mean?
Is APT malware?
APT vs malware, that’s a common source of confusion. APTs use malware (and sometimes even custom-designed malware) in their arsenal, but it's just a means to an end. They also use social engineering, stolen credentials, phishing emails, and fileless attacks that leverage legitimate Windows system tools. Valid usernames, passwords, and your own administrative tools are also what they use to get in and stay in.
Malware types vs APT objectives
Malware comes in many forms: the common ones include viruses (self-replicating code), worms (standalone malware that spreads automatically), trojans (programs masquerading as legitimate software), and ransomware (locks you out and demands payment). Other types include spyware, adware, rootkits, and keyloggers.
APTs pursue different objectives. Attackers want continued access, not a quick ransomware drop for a few bitcoins. They want your precious IP. They use various persistence mechanisms across different networks, launching attacks from within using legitimate accounts, creating duplicate user profiles, or setting up new admin accounts.
The dwell time separates basic malware from APTs. Security teams may detect malware within hours or days, and often less than a week. Average dwell time for APTs? They operate on an entirely different timeline, with dwell times ranging from months to over a year, and in some cases, years of undetected access.