Talk is cheap in the world of APTs. The malicious packages publicly associated with advanced threats are simply the ones that were easily detectable using today's technology. What does it take to construct and deliver remotely controllable espionage packages guaranteed to bypass the layers of defensive strata of a security savvy victim? Let's walk through some of the ways.