End of story¶
By the time an attacker reaches this phase, the objective is in sight: data staged, compressed, encrypted, and moved; systems disrupted or destroyed; the evidence of how they got there quietly tidied up behind them. Detection here is late, but not useless. Exfiltration has a shape, impact has a signature, and forensics still works even after the fact. This section covers collection, exfiltration, and impact from the defender’s perspective, with an emphasis on what can still be caught, contained, and learned from.