ID: TEQ-072
Phase(s): Post-Attack
Tactic(s): Invoice Abuse

The adversary will modify the address and personal information enough to avoid automated controls for detecting a single address being used multiple times (a common defensive measure used to limit the number of times a specific individual can purchase a specific item). The address will nonetheless be written in a way that allows a human to interpret it correctly and deliver to the adversary's intended address.

Related Kill Chains