Finally, the attacker executes the attack quickly and then removes the evidence to avoid being identified by the target and ensure that the latter cannot guard against future attacks.
Time scale
Hours – days
Tactics used
- Data extraction
- Financial fraud
- Denial of Service (DoS)