60 - Cyber Kill Chain - Exploitation

The attacker transmits the weaponized bundle to the target through phishing emails, malicious websites or direct system penetration.