command and control
data exfiltration
living off the land
spear phishing
credential theft
lateral movement
persistence mechanisms
fileless malware
obfuscation
privilege escalation
watering hole
supply chain compromise
backdoor installation
DLL side-loading
anti-forensics
web shell deployment
use of legitimate tools
zero-day exploitation