After a threat actor or group has established a foothold, they will proceed to deploy their payload on the targeted device or network. Malware can be downloaded and executed on a targeted system via a malicious link, a file executed by a user or by executing remote commands and scripts via command line and script interpreters.