Invoice Abuse
ID: | TAC-22 |
Phase: | Post-Attack |
The adversary will use PO Boxes, fake addresses, and/or fake identities to bypass restrictions that limit services or purchases to a limited number per individual or address.
ID: | TAC-22 |
Phase: | Post-Attack |
The adversary will use PO Boxes, fake addresses, and/or fake identities to bypass restrictions that limit services or purchases to a limited number per individual or address.