EXAMPLES: Based on what's been reported, this attack follows a well-worn <attack path> – target privileged accounts with administrative access, escalate privileges to enable lateral movement, and obtain access to highly sensitive data and information – effectively completing the intended goal.