In the shadowy realm of cyberspace, a silent battle rages. Attackers, wielding sophisticated instruments, launch cyber assaults with devastating potential. These malicious actors operate with stealthy methods, exploiting vulnerabilities to infiltrate critical infrastructures. Understanding the intricate tactics employed by cyber agents is paramount