Cyberattackers Leveraged More Than 500 Unique Tools and Tact