The attacker gains access to the target's network, often through a spear-phishing attack
Was this helpful?