Step 1: The Vector - Command & Control (C2) Channel
The first phase of the attack is to install malware on the target device and establish a reliable communication path to activate it. Despite low bandwidth, the global coverage and resilience of satellite links make them uniquely suitable for use as a covert command channel. This allows an attacker to reach targets that are far from conventional networks.