Anatomy of a Stealth Thwarted Breach