Your organization has detected a potential security breach, and as the cybersecurity analyst, you are tasked with analyzing the attack. During investigation, you notice the attacker is currently in the process of establishing a backdoor for persistent access to the network. According to the cyber kill chain model, which stage of the attack is currently being executed?
Reconnaissance
Command and Control (C2)
Weaponization
Delivery