What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Lorrie
2 months agoCarey
2 months agoWinifred
3 months agoLuis
3 months agoMichael
3 months agoNoe
3 months agoGwen
4 months agoGwenn
4 months agoTyisha
4 months agoDusti
4 months agoMalinda
4 months agoJacqueline
4 months agoJustine
5 months agoJennifer
5 months agoAlexis
5 months agoStephen
2 months agoHannah
2 months agoCarlota
2 months agoColene
2 months agoLeeann
6 months ago