Source: https://www.linkedin.com/feed/update/urn%3Ali%3Ashare%3A7033484707124154368
#Adversary: #Adversarial #Attacks #Command #Control: WIP26 Espionage | Threat Actors Abuse Cloud Infrastructure in Targeted Telco Attacks: https://lnkd.in/gEW5ufN5 : #Cloud #Infrastructure #Telecommunications #Attack #Vectors #WhatsApp #Dropbox #Malware #MS365 #Azure #Google #Codebase
The WIP26 activity is initiated by precision targeting of employees through WhatsApp messages that contain Dropbox links to a malware loader. Tricking employees into downloading and executing the loader ultimately leads to the deployment of #backdoors that leverage Microsoft 365 Mail and Google Firebase instances as C2 servers. We refer to these backdoors as CMD365 and CMDEmber, respectively. The main functionality of CMD365 and CMDEmber is to execute attacker-provided system commands using the Windows command interpreter.
The use of public #Cloud #infrastructure for #C2 purposes is an attempt to make malicious C2 network traffic look legitimate and therefore make #detection harder for defenders. The CMD365 and CMDEmber samples we observed #masquerade as utility software, such as a PDF editor or browser, and as software that conducts update operations. The masquerading attempt involves the use of filenames, application icons, and digital signatures that indicate existing software vendors.
—
We Create the Digital Future™. You Can Too! Let’s Show You How!
AIMLExchange™: AIMLExchange.com: We Create the Digital Future™
BRINT™: BRINT.com: From Future of Finance™ to Future of FinTech™
C4I-Cyber™: C4I-Cyber.com: Because the Future of the World Depends Upon It™
—
30-Years of #ControlDoctrine: Beyond #Cyber #Security to #Command #Control:
2023: Latest #Journal #Articles:
IJKEM https://lnkd.in/gJQwgkra :
JIFM https://lnkd.in/gwmFB6zb :
From Pioneering #Cyber #Digital #Control in 1990s to Advancing the World Beyond #AI-#Quantum Supremacy Hype to Reality of #C4I-#Cyber #Command #Control #Supremacy in 2020s:
#Pentagon #JointChiefs #USAF #USSF
United States Department of Defense
The Joint Staff
United States Air Force
United States Space Force
#C4I-#Cyber #Command & #Control Supremacy: Why It’s More Critical Than AI & Quantum Supremacy: What You Can Do about It? #Security in Post-COVID Era Beyond #Data, #Models, #Algorithms:
2021 New York State Cyber Security Conference, June 8-9, 2021, Empire State Plaza – Albany, NY: https://lnkd.in/eidSUPE :
Presentation Video:
https://lnkd.in/g8w6GH34 :
In spite of latest #AI and #Quantum #Computing capabilities… Given unprecedented global and national cyber-attacks, critical #Systems need to advance beyond C2 to include focus on #Adversarial C2 and #CounterAdversarial C2 capabilities to survive and thrive.
C4I-Cyber Quantum Valley-SiliconValley Digital Pioneer USAF-USSF Ventures Engineering Sustainability
Silicon Valley’s Next Big Thing™: CEO-CTO-CFO Know-Build-Monetize™ Networks: Join The CxO Metaverse™
Global Risk Management Network LLC: Silicon Valley-Wall Street-Pentagon Networks: CNY-Quantum Valley