Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.