Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into Incalsol's systems. To deliver the malware, he used the current employees' email IDs to send fraudulent emails embedded with malicious links that seem to be legitimate. When a victim employee clicks on the link, they are directed to a fraudulent website that automatically loads Flash and triggers the exploit.
What is the technique used by Jack to launch the fileless malware on the target systems?
insaniunt
11 months ago581777a
1 year, 3 months agoVincent_Lu
1 year, 5 months agojeremy13
1 year, 6 months agovictorfs
1 year, 6 months agosausageman
1 year, 7 months agosausageman
1 year, 7 months agosausageman
1 year, 7 months agoeli117
1 year, 7 months ago