Cyber attack persistence