What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Jillian
11 days agoBrock
16 days agoVicky
2 days agoLaurene
28 days agoClement
1 months agoViki
19 days agoBrianne
23 days agoWayne
1 months agoBettina
2 months agoElvera
2 months agoNan
2 months agoStarr
27 days agoKimi
28 days agoEdison
1 months agoCarlee
2 months agoVernice
22 days agoAlpha
28 days agoJanna
2 months ago