Great story but technically so in accurate. Gigs of data get moved across a network without anyone or any threat hunting software noticing and then the threat actors just slip the data out via email again without anyone noticing. Sorry just not happening!