GU Cyber Security Spear Phishing Attack Paper
Description
Plan a well-formed spear phishing attack scenario with objectives and social engineering to execute an attack aimed at corporate espionage. Once the network has been infiltrated, describe the next steps to reach objectives while avoiding detection. The plan will be from the attacker’s perspective and may target individuals to achieve the stated objectives of the attack. Within the crafted email to your target, highlight 5 indicators of compromise (IoCs) that might be used to detect attacks from the same campaign. You may highlight, circle, or have the IoCs stand out in some clear way for grading.
Describe the malware that was used and how it was used in your phishing attack. You may repurpose existing known malware as found in the MITRE ATT&CK framework or another reputable source as might be done by a threat actor. Describe how you would move laterally in the network and execute any additional exploits to reach your objectives for the APT.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."