Invoice Abuse
| ID: | TAC-22 |
| Phase: | Post-Attack |
The adversary will use PO Boxes, fake addresses, and/or fake identities to bypass restrictions that limit services or purchases to a limited number per individual or address.
| ID: | TAC-22 |
| Phase: | Post-Attack |
The adversary will use PO Boxes, fake addresses, and/or fake identities to bypass restrictions that limit services or purchases to a limited number per individual or address.