Threat Research
APT Group Analysis: Tactics of State-Sponsored Threat Actors
A technical deep-dive into the tooling, infrastructure, and behavioral patterns of three active nation-state threat groups targeting financial services and critical infrastructure.

Background
Advanced Persistent Threat (APT) actors differ from financially motivated cybercriminals in their operational tempo, target selection, and ultimate objectives. Where a ransomware group wants to encrypt data and collect payment within days, an APT actor may maintain persistent access for 12–18 months before taking any visible action — gathering intelligence, mapping networks, pre-positioning for future operations.
This report synthesizes findings from our threat research team’s analysis of three active state-sponsored groups observed targeting financial services organizations and critical infrastructure operators over the past 18 months. To protect ongoing investigations, we refer to these groups by internal tracking designations rather than publicly attributed names.
Group Alpha: Financial Intelligence Collection
Group Alpha has been active since at least 2019 and exhibits strong operational security discipline. The group’s primary objective appears to be financial intelligence collection — specifically, acquiring non-public information about pending mergers, regulatory decisions, and commodity positions.
Initial Access: The group consistently uses spear-phishing emails referencing authentic recent events (regulatory filings, earnings calls, industry conferences) to lower recipient suspicion. Documents contain OLE objects that trigger macro execution when the file is opened and edited.
Tooling: The group deploys a lightweight custom implant we call “Whisper” — a C-based beacon that communicates over HTTPS to infrastructure that cycles every 72 hours. The implant has no persistence mechanism of its own; instead, it abuses COM object registration to achieve persistence through legitimate Windows mechanisms.
Dwell Time: Median observed dwell time is 94 days. The group appears to prioritize stealth over speed — in multiple observed intrusions, the group maintained access for over a year without taking any observable action beyond periodic reconnaissance.
Group Beta: Infrastructure Reconnaissance
Group Beta targets operational technology (OT) networks in the energy and utilities sector, with a pattern of behavior consistent with pre-positioning for potential disruption operations.
Initial Access: Unlike Group Alpha’s targeted phishing, Group Beta exploits publicly known vulnerabilities in internet-facing systems, particularly VPN concentrators and remote desktop services. The group maintains an active vulnerability research capability and has been observed exploiting vulnerabilities within 48 hours of public disclosure.
Lateral Movement: Once inside an IT network, the group systematically identifies and maps connections to OT environments. They show patience in this phase — taking weeks or months to understand the IT/OT boundary before attempting to cross it. Notably, the group avoids triggering alerts in OT monitoring systems even when they have access to them.
Infrastructure: Command-and-control infrastructure is primarily residential IP addresses (likely compromised home routers and IoT devices) that are difficult to block without significant collateral impact.
Group Gamma: Intellectual Property Theft
Group Gamma targets defense contractors and technology companies, with a focus on acquiring intellectual property related to advanced manufacturing processes and software development.
Initial Access: The group has developed a sophisticated supply chain attack capability. In two confirmed cases, the group compromised a software vendor’s build infrastructure and modified an update distributed to hundreds of downstream customers, providing widespread initial access from a single successful intrusion.
Tooling: Group Gamma uses exclusively open-source tooling (Cobalt Strike profiles designed to blend with legitimate traffic, custom Python scripts, standard admin tools) to minimize the uniqueness of their tradecraft and complicate attribution.
Detection Opportunities
Despite the sophistication of these groups, each has observable patterns that can support detection:
All three groups rely on spear-phishing for initial access. Strong email security controls — anti-spoofing, sandboxed attachment analysis, user training — reduce but do not eliminate initial access success.
The LOTL techniques used for persistence and lateral movement generate WMI and scheduled task events that, with proper auditing enabled and tuned alerting, are detectable. The challenge is volume: most organizations generate thousands of legitimate WMI events per day.
Outbound communications to C2 infrastructure, while disguised as legitimate traffic, typically show anomalous patterns in timing, destination diversity, and data volume. Network flow analysis with behavioral baselines catches the outliers.
The most reliable detection for all three groups is credential abuse: domain admin credentials used from non-PAW workstations, service accounts authenticating interactively, or accounts authenticating from unusual geographic locations. Identity-centric monitoring remains the highest-signal detection investment for APT defense.
- Initial access via spear-phishing. Highly targeted phishing with sector-specific lures — regulatory filings, M&A documents, conference invitations — achieved initial access in 73% of observed campaigns across all three groups.
- Living-off-the-land persistence. COM hijacking and WMI subscriptions enabled persistence without binary implants, surviving most EDR detection for an average of 47 days before discovery.
- Credential harvesting via LSASS. Minifilter driver abuse allowed memory reads of LSASS without triggering Process Access Control policies on patched endpoints, yielding domain credentials within hours of initial compromise.
"The most dangerous APT actors don't rush. They spend months inside a network doing nothing — just watching, mapping, and waiting for the right moment."