In an APT attack, a threat actor uses the most sophisticated tactics and technologies to penetrate a network. APTs aim to explore the network while remaining undetected for extended periods. APTs are most often used by nation-state threat actors wishing to cause severe disruption and damage to the economic and political stability of a country.