A malicious actor has gained access to an internal network by means of social engineering. The actor does not want to lose access in order to continue the attack. Which of the following best describes the current stage of the Cyber Kill Chain that the threat actor is currently operating in?
Show Answer & Explanation
Correct Answer: C. Delivery
The actor has already gained access via social engineering and now wants to maintain that access — this is the Exploitation stage, where the attacker leverages their foothold. Note: maintaining persistence is sometimes associated with "Installation" in some Kill Chain models, but among the given options, Exploitation is the closest match for active use of gained access. Weaponization (A) is pre-attack preparation. Reconnaissance (B) is pre-intrusion information gathering. Delivery (C) is sending the attack vector — already completed via social engineering.