After reconnaissance, the final step in a cyberattack is the weaponization stage. Attackers develop or modify malware to compromise targets. They create remote access trojans and exploits to transport the trojans and circumvent defenses. Newly created malware indicates tailored, ongoing operations, while older malware is likely purchased off-the-shelf. Defenses include educating the public, analyzing malware creation processes, detecting weaponized artifacts, and collecting forensic evidence to investigate campaigns.