Your organization has detected unusual network traffic patterns and strange outbound connections over a period of several months. Investigation into these anomalies has revealed the use of complex encryption methods and data exfiltration to command and control servers. As a cybersecurity analyst, what type of threat actor are you most likely dealing with in this scenario?
Organized crime
Advanced persistent threat (APT)
Hacktivist
Script kiddie