“Once malicious software code is delivered, it burrows in and hides in a targeted network. That code, known as malware, can lurk for years in intelligence or attack schemes that are sometimes known as ‘advanced persistent threats.’ Eventually, the code reaches back out to the hackers for instructions, often cloaking the communication through encryption or masking it to seem like innocuous Web browsing by an employee.”
Source:In cyberattacks, hacking humans is highly effective way to access systems – The Washington Post