Watching for data being gatheredΒΆ

Before anything leaves the network, it has to be collected. Attackers enumerate filesystems, scrape credentials from memory, archive mailboxes, and stage data in a location they control before attempting to move it out. Collection is often the quietest phase: it involves legitimate-looking file operations, standard archive utilities, and tools already present on the system. Detecting it requires watching for the shape of the activity rather than the tools themselves.