Findings Adversaries performed targeted reconnaissance using public records and social media, with activity traced to the compromised employee's workstation. -- Choose Option -- Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Actions on Objectives
A phishing email containing a malicious link was sent to the employee, providing the initial compromise of the workstation. -- Choose Option -- Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Actions on Objectives
Customized malware was crafted to exploit known vulnerabilities in the employee's system -- Choose Option -- Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Actions on Objectives
The phishing email with the malicious attachment was successfully delivered to the employee's inbox. -- Choose Option -- Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Actions on Objectives
The malicious document exploit executed, leveraging a vulnerability in the employee's word processor to run code on the system. -- Choose Option -- Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Actions on Objectives
The adversary created a scheduled task to maintain access and automatically re-launch the malware after reboot. -- Choose Option -- Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Actions on Objectives
After establishing a foothold, attackers used stolen credentials to move laterally to a corporate file server. -- Choose Option -- Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Actions on Objectives
Unauthorized remote connections were established from the infected PC, enabling adversaries to control the system. -- Choose Option -- Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Actions on Objectives
Attackers exfiltrated sensitive customer data to an external server. -- Choose Option -- Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Actions on Objectives