What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Lashaunda
2 months agoPaz
29 days agoCecily
1 months agoSkye
2 months agoMari
2 months agoWilbert
2 months agoPaulina
2 months agoGeoffrey
2 months agoRosita
2 months agoFallon
1 months agoWhitney
2 months agoVerona
2 months agoFrancine
2 months agoMelita
3 months agoGlory
3 months agoNikita
2 months agoStefania
2 months agoVesta
2 months agoCarole
2 months ago