Before attackers can perform data exfiltration, they'll need to gain initial access into a network and computer system.
This can be done through a social engineering attack like phishing, which tricks people into disclosing sensitive data.
Attackers can send phishing emails with attachments or links that trick their target into entering their credentials.
Now, an attacker has successfully gained access to their device.