Then, research at least two APTs. Explain how they all meet your definition of an APT. Say what the APTs that you
chose have in common and how they differ. What do they do?
Are there any indications of attribution? Be sure to discuss the motivations and TTPs of the attackers, a
characterization of the adversaries, the types of attacks they carry out, how covert channels are used to
communicate back to C&C servers and how, if at all, the perpetrators employ social engineering.
These are some logical questions to get you started.
Do not just answer them in succession.
And do not just write a section for each APT.
Write a graduate-level paper, as outlined above, that integrates your research to answer these questions and any others that you think important.