What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Lashaunda
23 days agoCecily
3 days agoSkye
14 days agoMari
24 days agoWilbert
25 days agoPaulina
28 days agoGeoffrey
29 days agoRosita
1 months agoWhitney
10 days agoVerona
17 days agoFrancine
18 days agoMelita
2 months agoGlory
2 months agoNikita
23 days agoStefania
26 days agoVesta
27 days agoCarole
1 months ago