The cyber kill chain is a cybersecurity model developed by Lockheed Martin that outlines the stages of a cyber-attack, identifies vulnerabilities, and helps security teams stop the attacks at each stage. At which stage does the intruder transmit the malware via a phishing email or another medium?