APT / Nation-State Intrusion Response Quickstart
Time-boxed response path for a suspected advanced persistent threat. APT incidents reward patience and thoroughness over speed: the fastest short-term containment is often the cause of failed long-term eradication. This path emphasizes TTP characterization, dwell-time hunting, and assume-breach recovery.
First 15 Minutes
Validate the APT Hypothesis
CriticalConfirm the observations that triggered the APT classification: custom or non-public tooling, targeted rather than opportunistic behavior, long-dwell indicators, anti-forensics, or a nation-state advisory match. APT classification carries operational and legal implications; avoid the label unless evidence supports it, but do not under-classify if evidence is present.
Activate Closed Incident Bridge
CriticalConvene a closed-bridge with SOC lead, TI lead, legal counsel, and CISO. Restrict incident-channel access on a need-to-know basis; assume the adversary may be monitoring internal Slack/Teams/email. Agree on a private attribution posture for the investigation phase; avoid public attribution statements without explicit approval.
Preserve Volatile Evidence Before Disturbance
CriticalAPT tooling often resides in memory or relies on network connections that disappear on containment action. Before any containment step, capture memory from suspected-compromised hosts and snapshot active network connections. Lost volatile evidence is hard to recreate; rushed containment that destroys it makes the investigation harder.
First 60 Minutes
Build Initial TTP Profile
CriticalEnumerate confirmed techniques so far against MITRE ATT&CK tactics (Initial Access, Execution, Persistence, Privilege Escalation, Credential Access, Discovery, Lateral Movement, Collection, C2, Exfiltration). Identify 3-5 candidate threat groups whose tracked tradecraft matches observed TTPs; do not rush to a single attribution. For each candidate, build a hunt list of additional tooling and persistence you should look for.
Pivot Through Attacker Infrastructure
From each confirmed IoC, pivot through passive DNS, WHOIS, TLS certificate registries (Censys, Shodan), and threat-intel feeds to discover attacker infrastructure clusters. Record every pivot and the confidence level behind each additional IoC. Engage threat-intel team for ISAC and vendor-private IoC sharing under NDA.
Decide LEA Coordination Posture
If attribution points to a nation-state or nation-state-adjacent actor, decide whether to engage law-enforcement or a national CSIRT (CISA, NCSC, CERT-FR, BSI) now. This is a legal/strategic decision -- get legal counsel and the CISO aligned. If LEA engagement is chosen, establish a single point of contact and start a document trail for every LEA-relevant observation.
First 4 Hours
Extend Investigation Window to Retention Limit
CriticalAPT actors commonly dwell for months before detection. Extend the investigation window to the full retention of each log source; document gaps where retention is shorter than suspected dwell. If key retention is short (EDR 30 days, DNS 7 days), initiate log-recovery from backup or SIEM cold storage immediately.
Hunt LOLBin Abuse and Low-Prevalence Persistence
CriticalHunt for living-off-the-land patterns (anomalous parent-child chains, rare command-line patterns, LSASS access from unexpected processes) and low-prevalence persistence (WMI event subscriptions, scheduled task XML with hidden flags, service DLLs in unusual paths, COM hijacking, AppInit_DLLs, IFEO debugger hijacks). APT persistence is usually unique per host or campaign; generic signatures miss it.
Hunt Cloud Identity Persistence
CriticalHunt for long-dwell OAuth app grants, mailbox rules that forward to external addresses, audit-suppression toggles, unexplained administrative-role assignments, and service-principal changes in Entra ID. Cloud identity persistence is frequently the APT foothold that survives an endpoint-only cleanup.
Plan the Assume-Breach Reset
Begin planning the domain-wide reset: double krbtgt rotation (not single), service-account rotation, domain-admin and Entra ID global-admin reset, organization-wide refresh-token revocation, and rebuild of any compromised-tier systems. Sequence carefully with application owners; rushed identity reset is a common cause of business disruption that prolongs the incident.
DFIR Assist — APT / Nation-State Intrusion Response Quickstart Quickstart | Printed 4/19/2026