Targeted intrusion Reconnaissance Exfiltration Command and control Data collection and staging You’ve been hacked!