Hackers reach out to companies via a "Contact Us" website form They then talk with the victims for weeks before deploying the malware The hackers are attacking with custom-built backdoors ...