Alice, a professional hacker, targeted an organization’s cloud services. She infiltrated the target’s MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization.
Which of the following cloud attacks did Alice perform in the above scenario?
jeremy13
Highly Voted 1 year, 7 months agoVincent_Lu
Highly Voted 1 year, 5 months agoremrey
Most Recent 4 months, 1 week agoLordXander
8 months agoinsaniunt
11 months ago581777a
1 year, 3 months agovictorfs
1 year, 6 months agosausageman
1 year, 7 months agoeli117
1 year, 7 months ago