• Maintaining access and establishing persistence.
  • Data exfiltration methods.