Infiltration Phase
Licit machines must be compromised to implement the different attack phases.
Ideally in a privileged zone of the network, and/or,
With access credentials, and/or,
User credentials, address(es), hardware key, etc ...
With special software, and/or,
Target data.
This may include the installation of software or usage of the licit vulnerable software.
May be remotely controlled (constantly or not).
Command and control (C&C).
May have autonomous (AI) bots installed to perform illicit actions.
When remote C&C is not possible or subject to easy detection.
Last updated