What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Sheridan
2 months agoLeonora
2 months agoAnika
3 months agoDesmond
3 months agoNieves
1 months agoMabelle
1 months agoReena
1 months agoKenda
2 months agoRoxane
3 months agoDarci
3 months agoAdria
3 months agoTonja
2 months agoWynell
2 months agoTonja
2 months agoMitzie
3 months agoVerda
3 months agoAshton
3 months ago