Which statement is true of advanced persistent threats (APTs)?