Jigging
| ID: | TEQ-072 | 
| Phase(s): | Post-Attack | 
| Tactic(s): | Invoice Abuse | 
The adversary will modify the address and personal information enough to avoid automated controls for detecting a single address being used multiple times (a common defensive measure used to limit the number of times a specific individual can purchase a specific item). The address will nonetheless be written in a way that allows a human to interpret it correctly and deliver to the adversary's intended address.