Your organization has detected unusual network traffic patterns and strange outbound connections over a period of several months. Investigation into these anomalies has revealed the use of complex encryption methods and data exfiltration to command and control servers. As a cybersecurity analyst, what type of threat actor are you most likely dealing with in this scenario?
Advanced persistent threat (APT)
|Incident Response and Management
|Reporting and Communication