What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Sheridan
6 months agoLeonora
6 months agoAnika
7 months agoDesmond
7 months agoNieves
5 months agoMabelle
5 months agoReena
6 months agoKenda
6 months agoRoxane
7 months agoDarci
7 months agoAdria
7 months agoTonja
6 months agoWynell
6 months agoTonja
6 months agoMitzie
7 months agoVerda
7 months agoAshton
7 months ago