Fake Identity
ID: | TEQ-073 |
Phase(s): | Post-Attack |
Tactic(s): | Invoice Abuse |
The adversary will hide their true identity by providing fake details to the invoice process, such as name, phone number, etc.
ID: | TEQ-073 |
Phase(s): | Post-Attack |
Tactic(s): | Invoice Abuse |
The adversary will hide their true identity by providing fake details to the invoice process, such as name, phone number, etc.