Fake Identity
| ID: | TEQ-073 | 
| Phase(s): | Post-Attack | 
| Tactic(s): | Invoice Abuse | 
The adversary will hide their true identity by providing fake details to the invoice process, such as name, phone number, etc.
| ID: | TEQ-073 | 
| Phase(s): | Post-Attack | 
| Tactic(s): | Invoice Abuse | 
The adversary will hide their true identity by providing fake details to the invoice process, such as name, phone number, etc.