Warnings against targeted, socially-engineered emails dropping
trojans to exfiltrate sensitive information were published by UK and US
CERT organisations in 2005. This method was used throughout the early 1990s and does not in itself constitute an APT. The term "advanced persistent threat" has been cited as originating from the
United States Air Force in 2006 with Colonel Greg Rattray cited as the individual who coined the term. The
Stuxnet computer worm, which targeted the computer hardware of
Iran's nuclear program, is one example of an APT attack. In this case, the Iranian government might consider the Stuxnet creators to be an advanced persistent threat. Within the
computer security community, and increasingly within the media, the term is almost always used in reference to a long-term pattern of sophisticated computer network exploitation aimed at governments, companies, and political activists, and by extension, also to ascribe the A, P and T attributes to the groups behind these attacks. Advanced persistent threat (APT) as a term may be shifting focus to computer-based hacking due to the rising number of occurrences.
PC World reported an 81 percent increase from 2010 to 2011 of particularly advanced targeted computer attacks. Actors in many countries have used
cyberspace as a means to gather intelligence on individuals and groups of individuals of interest. The
United States Cyber Command is tasked with coordinating the US military's offensive and defensive
cyber operations. Numerous sources have alleged that some APT groups are affiliated with, or are agents of, governments of
sovereign states. Businesses holding a large quantity of
personally identifiable information are at high risk of being targeted by advanced persistent threats, including: • Agriculture • Energy •
Financial institutions • Health care • Higher education • Manufacturing • Technology • Telecommunications •
Transportation A Bell Canada study provided deep research into the anatomy of APTs and uncovered widespread presence in Canadian government and critical infrastructure. Attribution was established to Chinese and Russian actors. == Life cycle ==