This is a dedicated watch page for a single video.
An attacker is trying to steal data regarding a new product that an organization is developing. The attacker has planted malware on the system and has left it on the system for eight months. What is the name of this type of attacker?