Cybercriminals enlisting APTs are patient and much more technically advanced than the common cyberthief. These more sophisticated and motivated miscreants infiltrate networks and surreptitiously steal critical data bit by bit, day by day, month by month. If a company reacts too hastily after discovering them, the bad guys can quickly modify the coding on which their attacks are based and regain anonymity. Some companies are getting a handle on these elite attackers and their methods. We look to them to help us better equip other security teams to address this plague.