Problem Statement
Describe the lifecycle of a malware attack.
Explanation
A malware attack generally follows several stages. First, the attacker delivers the malicious file through email attachments, downloads, or infected websites. Next, the malware executes and installs itself on the target system.
Once active, it may connect to a command-and-control server, steal data, or spread to other systems. Finally, it hides its presence by modifying system files or disabling antivirus defenses. Understanding this lifecycle helps security teams respond at each stage — from detection to containment and removal.