What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Sheridan
5 months agoLeonora
5 months agoAnika
5 months agoDesmond
6 months agoNieves
4 months agoMabelle
4 months agoReena
4 months agoKenda
5 months agoRoxane
6 months agoDarci
6 months agoAdria
6 months agoTonja
5 months agoWynell
5 months agoTonja
5 months agoMitzie
5 months agoVerda
5 months agoAshton
6 months ago