Jigging
ID: | TEQ-072 |
Phase(s): | Post-Attack |
Tactic(s): | Invoice Abuse |
The adversary will modify the address and personal information enough to avoid automated controls for detecting a single address being used multiple times (a common defensive measure used to limit the number of times a specific individual can purchase a specific item). The address will nonetheless be written in a way that allows a human to interpret it correctly and deliver to the adversary's intended address.