Some of the most consequential cyber operations underway today do not look like attacks at all. They cause no immediate disruption, trigger no alarms and may remain invisible for years.