Infiltration Phase

Licit machines must be compromised to implement the different attack phases.

  • Ideally in a privileged zone of the network, and/or,

  • With access credentials, and/or,

    • User credentials, address(es), hardware key, etc ...

  • With special software, and/or,

  • Target data.

This may include the installation of software or usage of the licit vulnerable software.

May be remotely controlled (constantly or not).

  • Command and control (C&C).

May have autonomous (AI) bots installed to perform illicit actions.

  • When remote C&C is not possible or subject to easy detection.

Last updated