Initial Compromise

The attacker gains access to the target's network, often through a spear-phishing attack