Which security threat stage seeks to gather valuable data and upload it to a compromised system?
Correct Answer: A
TheExfiltrationstage in the threat lifecycle is when attackers attempt togather and transfer valuable data from a compromised system to an external location under their control. This stage typically follows data discovery and involves:
* Data Collection:Attackers collect sensitive information such as credentials, financial data, or intellectual property.
* Data Transfer:The data is then transferred out of the organization's network to the attacker's servers, often through encrypted channels to avoid detection.
* Significant Impact on Security and Privacy:Successful exfiltration can lead to substantial security and privacy violations, emphasizing the importance of detection and prevention mechanisms.
Exfiltration is a critical stage in a cyber attack, where valuable data is removed, posing a significant risk to the compromised organization.