Concept Flow - Advanced Persistent Threats (APT)
Initial Reconnaissance
Gaining Access
Establishing Persistence
Internal Reconnaissance
Data Collection & Exfiltration
Maintaining Presence
Goal Achieved or Detected
Exit or Continue
This flow shows how an APT attacker carefully plans and executes steps to stay hidden and steal data over a long time.