The document discusses targeted attacks from sophisticated, coordinated groups. These attackers are highly skilled, well-funded and can research and exploit new vulnerabilities to accomplish missions over months. Specific examples discussed include the Kalachakra attack and details on its spearphishing techniques, dropped executables, and command and control traffic. Methods of antivirus evasion, real world samples, exploit techniques and command and control servers used by advanced persistent threat groups are also covered.