Adversaries that successfully execute attack can achieve persistent anytime, anywhere access to a victim network, security researchers say.