During a post-mortem incident review meeting, it is noted that a malicious attacker attempted to achieve
network persistence by using vulnerabilities that appeared to be lower risk but ultimately allowed the attacker
to escalate their privileges. Which ofthe following did the attacker MOST likely apply?
An organization has received complaints from a number of its customers that their data has been breached.
However, after an investigation, the organization cannot detect any indicators of compromise. The breach was
MOST likely due to which type of attack?