What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Lorrie
4 months agoCarey
4 months agoWinifred
4 months agoLuis
4 months agoMichael
5 months agoNoe
5 months agoGwen
5 months agoGwenn
5 months agoTyisha
5 months agoDusti
6 months agoMalinda
6 months agoJacqueline
6 months agoJustine
6 months agoJennifer
7 months agoAlexis
7 months agoStephen
3 months agoHannah
3 months agoCarlota
3 months agoColene
4 months agoLeeann
8 months ago