What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Sheridan
6 months agoLeonora
7 months agoAnika
7 months agoDesmond
7 months agoNieves
6 months agoMabelle
6 months agoReena
6 months agoKenda
6 months agoRoxane
7 months agoDarci
8 months agoAdria
8 months agoTonja
7 months agoWynell
7 months agoTonja
7 months agoMitzie
7 months agoVerda
7 months agoAshton
7 months ago