Long-term, unauthorized access to systems for malicious purposes such as leakage of confidential data or sabotage (data corruption, denial of service, etc.). Advanced persistent threats (APTs) are usually undetected for long periods of time. See
denial-of-service attack,
data leakage and
corrupted file.