An attack launched by a threat actor in stealth mode where he gains unauthorized access to a computer network and remains undetected for an extended period of time.