What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Lorrie
3 months agoCarey
3 months agoWinifred
3 months agoLuis
3 months agoMichael
4 months agoNoe
4 months agoGwen
4 months agoGwenn
4 months agoTyisha
5 months agoDusti
5 months agoMalinda
5 months agoJacqueline
5 months agoJustine
5 months agoJennifer
6 months agoAlexis
6 months agoStephen
2 months agoHannah
2 months agoCarlota
2 months agoColene
3 months agoLeeann
7 months ago