What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Sheridan
3 months agoLeonora
3 months agoAnika
3 months agoDesmond
3 months agoNieves
2 months agoMabelle
2 months agoReena
2 months agoKenda
2 months agoRoxane
4 months agoDarci
4 months agoAdria
4 months agoTonja
3 months agoWynell
3 months agoTonja
3 months agoMitzie
3 months agoVerda
3 months agoAshton
3 months ago