What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Jillian
27 days agoJacqueline
7 days agoBrock
1 months agoTyisha
8 days agoMilly
13 days agoVicky
18 days agoLaurene
1 months agoClement
2 months agoViki
1 months agoBrianne
1 months agoWayne
2 months agoBettina
2 months agoElvera
2 months agoNan
2 months agoStarr
1 months agoKimi
1 months agoEdison
2 months agoCarlee
2 months agoVernice
1 months agoAlpha
1 months agoJanna
2 months ago