An analysis of how attackers used JetBrains vulnerabilities to maintain persistence, with CISA's attempts to evict them proving challenging.