What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Laurene
19 hours agoClement
4 days agoWayne
5 days agoBettina
22 days agoElvera
24 days agoNan
25 days agoKimi
20 hours agoEdison
5 days agoCarlee
1 months agoAlpha
18 hours agoJanna
19 days ago