The Cybersecurity Infantry, Part II: “Underground” Operations