Recon

Reconnaissance

Harvesting email addresses, conference information, etc

Weaponization

Attackers preparing and staging the attack by coupling exploit with backdoor into deliverable payload.

Weapon
Delivery

Delivery

Delivering weaponized bundle to the victim via email, usb, etc.

Exploitation

Exploiting a vulnerability to execute code on victim's system

Exploit
Install

Installation

Installing malware on the asset

Command & Control

Command channel for remote manipulation of victim's system

C
Objectives

Action on Objectives

With hands on keyboard, intruders accomplish.

What - Model Stages of Cyber Intrusion Activity

Why - Understand adversaries and identify weakness in process, technology and people

How - Describes Fortinet ATP Product Positioning