Investigators say Byzantine Hades intrusions are part of a particularly virulent form of cyber-espionage known as an ???advanced persistent threat.??? The malicious code embedded in attachments to spear-phish emails is often ???polymorphic??? ??? it changes form every time it runs ??? and burrows deep into computer networks to avoid discovery.