What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Sheridan
1 months agoLeonora
1 months agoAnika
2 months agoDesmond
2 months agoNieves
17 days agoMabelle
18 days agoReena
21 days agoKenda
30 days agoRoxane
2 months agoDarci
2 months agoAdria
2 months agoTonja
2 months agoWynell
2 months agoTonja
2 months agoMitzie
2 months agoVerda
2 months agoAshton
2 months ago