Home SecurityNetwork Security How APTs become long-term lurkers: Tools and techniques of a targeted attack