Persistent. APT is resilient in covert operations, in investigating and conducting a thorough
background check on would-be victims, for example, APT operations can be time consuming as it
may take months or even years to exfiltrate sensitive data from the targeted network without triggering any risk of detection. This is to maximize the rate of success of APT operations in
achieving the objective of leaking and stealing important data.