Targeted Attacks and the Privileged Pivot