What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Clement
1 days agoWayne
2 days agoBettina
19 days agoElvera
21 days agoNan
22 days agoEdison
2 days agoCarlee
28 days agoJanna
16 days ago