APT actors are characterized by strategic intent, persistence, and resourcing—commonly associated with state sponsorship or alignment—targeting sensitive assets such as government, defense, critical infrastructure, research IP, and executive communications. In Proofpoint-centered investigations, APT-style campaigns often show tailored lures (highly contextual pretexting), careful targeting (VIPs, finance, legal, IT), and “low-and-slow” operational patterns that reduce obvious malware signals. They may use credential phishing, session hijacking, or BEC-style social engineering as initial access, then pivot to living-off-the-land techniques and stealthy persistence in cloud mailboxes (inbox rules, forwarding, OAuth grants). Proofpoint telemetry (campaign clustering, threat actor mapping where available, impersonation indicators, supplier compromise signals) supports detection and scoping, but the defining attribute remains the attacker’s strategic targeting and persistence rather than any single technique. This distinction matters operationally: APT suspicion raises escalation thresholds, broadens scoping (adjacent mailboxes, suppliers, cloud audit logs), increases evidence preservation rigor, and typically triggers executive/legal coordination earlier in the response lifecycle.