According to HP Threat Researchers, attackers are now chaining multiple, often less common, binaries in single campaigns, complicating efforts to flag suspicious behavior.