Anwer Gertani

APT tracking and enterprise threat intelligence

Track nation-state actors and sophisticated criminal organisations targeting your sector — uncovering TTPs and campaign patterns before they reach your environment.

The speed at which advanced threat actors operate in 2025 has fundamentally changed what effective threat intelligence requires. Mandiant’s M-Trends 2026 report documents the global median dwell time at 14 days — but that headline figure masks a more alarming data point: the time between initial access and secondary threat group handoff has collapsed to 22 seconds in some campaigns, with attackers pre-staging malware during the initial infection. CrowdStrike’s 2026 Global Threat Report documents the average eCrime breakout time — initial compromise to lateral movement — at 29 minutes, with the fastest observed breakout occurring in 27 seconds. The fastest campaigns move from initial access to data exfiltration in 72 minutes.

Adversary speed and dwell time · Source: Mandiant M-Trends 2026, CrowdStrike GTR 2026

The financial cost of extended dwell time is documented precisely. Verizon’s research shows breaches contained before 200 days average $3.87 million; breaches that extend beyond 200 days cost $5.01 million — a $1.14 million penalty per incident for failing to detect early. Espionage-related breaches increased 163 percent in 2025 and now account for 17 percent of all incidents, with nation-state actors pursuing both intelligence collection and financial objectives simultaneously. CrowdStrike also documented an 89 percent surge in attacks leveraging AI tools for intrusion operations and social engineering.

Effective APT tracking requires direct engagement with adversary infrastructure and tooling — not consumption of vendor threat reports. That means reverse-engineering the malware families associated with specific groups, tracking C2 infrastructure through network indicators and certificate patterns, and correlating new activity against a historical understanding of how specific actors operate. The APT-specific average dwell time of 95 days — compared to the 14-day global median — illustrates the patience and persistence of nation-state actors. Detecting them requires the same patience and persistence in the defenders.

Intelligence that is ahead of the threat requires people who have actually reversed APT malware, not people who have read about it. The depth of understanding gained from disassembling a custom packer or tracing a C2 protocol through a debugger is qualitatively different from secondary intelligence consumption. It informs detection logic, IR playbooks, and architectural decisions in ways that no threat report can replicate.