After infiltrating the network or IT system, the attacker seeks to gain increased access by installing tools to monitor business processes and systems, thereby boosting the potential impact and financial rewards of the attack.
Time scale
Weeks – months
Tactics used
- Privilege escalation
- Network traversals
- Passive monitoring