The attacker deployed multiple malware families, including two backdoors and a proxy tunneller, and various reconnaissance tools. Analysis of the malware and tools used in an intrusion links a threat ...