Alice, a professional hacker, targeted an organization's cloud services. She infiltrated the target's MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her
MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization.
Which of the following cloud attacks did Alice perform in the above scenario?
Scryptic
Highly Voted 3 years, 3 months agoDaniel8660
Highly Voted 2 years, 2 months agohuyan
Most Recent 11 months, 2 weeks agoCHCHCHC
1 year, 4 months agoMyName7
2 years, 3 months agoMyName7
2 years, 3 months agoAleksVAnd
2 years, 9 months agomartco
3 years, 1 month agosairmanzur
3 years, 2 months agoANDRESCB1988
3 years, 5 months ago