Hidden threats resulting from APT lurk deep in control systems, in most cases for an extended period of time before an attack is launched.