What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Winifred
12 days agoBlossom
23 days agoKayleigh
23 days agoLenna
25 days agoSteffanie
26 days agoRhea
27 days agoWerner
7 days agoCory
9 days agoQuentin
29 days agoNohemi
10 days agoJamal
15 days agoCherelle
1 months ago