Following the attack, the adversary achieves their objective by transferring finances, products, services, and/or information into either their possession or the possession of another.

In the Post-Attack stage the adversary will either report on the acquired information, or take steps to ensure that a product or service is provided to them and handed into their possession. The adversary will often monetise their attack, such as by selling the acquired objective on an online marketplace or forum. Activities in this stage are sometimes performed by a bot and sometimes require manual intervention by the adversary.