Q: 7
Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a
malicious downloader to ensure it will not be detected by the victim organization's endpoint security
protections. Which of the following stages of the Cyber Kill Chain best aligns with the threat actor's
actions?
Options
Discussion
I don’t think it’s B. D matches closer since the attacker is actually building and testing their malware, not just gathering info. Recon is before this step. Pretty sure about D, but let me know if you see it differently.
Option B this sounds like Reconnaissance since they're gathering info from forums. Wouldn't weaponizing come after they actually have a payload ready?
Be respectful. No spam.