What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
Brock
1 days agoLaurene
13 days agoClement
16 days agoViki
4 days agoBrianne
8 days agoWayne
17 days agoBettina
1 months agoElvera
1 months agoNan
1 months agoStarr
12 days agoKimi
13 days agoEdison
17 days agoCarlee
1 months agoVernice
7 days agoAlpha
13 days agoJanna
1 months ago