#Adversary: #Adversarial #Attacks #Command #Control: WIP26 Espionage | Threat Actors Ab. . .

Source: https://www.linkedin.com/feed/update/urn%3Ali%3Ashare%3A7033484707124154368

#Adversary: #Adversarial #Attacks #Command #Control: WIP26 Espionage | Threat Actors Abuse Cloud Infrastructure in Targeted Telco Attacks: https://lnkd.in/gEW5ufN5 : #Cloud #Infrastructure #Telecommunications #Attack #Vectors #WhatsApp #Dropbox #Malware #MS365 #Azure #Google #Codebase

The WIP26 activity is initiated by precision targeting of employees through WhatsApp messages that contain Dropbox links to a malware loader. Tricking employees into downloading and executing the loader ultimately leads to the deployment of #backdoors that leverage Microsoft 365 Mail and Google Firebase instances as C2 servers. We refer to these backdoors as CMD365 and CMDEmber, respectively. The main functionality of CMD365 and CMDEmber is to execute attacker-provided system commands using the Windows command interpreter.

The use of public #Cloud #infrastructure for #C2 purposes is an attempt to make malicious C2 network traffic look legitimate and therefore make #detection harder for defenders. The CMD365 and CMDEmber samples we observed #masquerade as utility software, such as a PDF editor or browser, and as software that conducts update operations. The masquerading attempt involves the use of filenames, application icons, and digital signatures that indicate existing software vendors.


We Create the Digital Future™. You Can Too! Let’s Show You How!
AIMLExchange™: AIMLExchange.com: We Create the Digital Future™
BRINT™: BRINT.com: From Future of Finance™ to Future of FinTech™
C4I-Cyber™: C4I-Cyber.com: Because the Future of the World Depends Upon It™

30-Years of #ControlDoctrine: Beyond #Cyber #Security to #Command #Control:

2023: Latest #Journal #Articles:
IJKEM https://lnkd.in/gJQwgkra :
JIFM https://lnkd.in/gwmFB6zb :

From Pioneering #Cyber #Digital #Control in 1990s to Advancing the World Beyond #AI-#Quantum Supremacy Hype to Reality of #C4I-#Cyber #Command #Control #Supremacy in 2020s:

#Pentagon #JointChiefs #USAF #USSF
United States Department of Defense
The Joint Staff
United States Air Force
United States Space Force

#C4I-#Cyber #Command & #Control Supremacy: Why It’s More Critical Than AI & Quantum Supremacy: What You Can Do about It? #Security in Post-COVID Era Beyond #Data, #Models, #Algorithms:
2021 New York State Cyber Security Conference, June 8-9, 2021, Empire State Plaza – Albany, NY: https://lnkd.in/eidSUPE :

Presentation Video:
https://lnkd.in/g8w6GH34 :

#BeyondC2

In spite of latest #AI and #Quantum #Computing capabilities… Given unprecedented global and national cyber-attacks, critical #Systems need to advance beyond C2 to include focus on #Adversarial C2 and #CounterAdversarial C2 capabilities to survive and thrive.

C4I-Cyber Quantum Valley-SiliconValley Digital Pioneer USAF-USSF Ventures Engineering Sustainability

Silicon Valley’s Next Big Thing™: CEO-CTO-CFO Know-Build-Monetize™ Networks: Join The CxO Metaverse™

Global Risk Management Network LLC: Silicon Valley-Wall Street-Pentagon Networks: CNY-Quantum Valley

Share this post
Avatar photo

Global Post AI-Quantum Finance & Trading Networks Pioneer Dr.-Eng.-Prof. Yogesh Malhotra is the “Singular Post AI-Quantum Pioneer” identified by Grok AI with R&D impact recognized among Artificial Intelligence (AI) and Quantitative Finance Nobel Laureates. As MIT-Princeton AI-ML-Cyber-Crypto-Quantum Finance & Trading and FinTech-Crypto Faculty-Industry Expert, and U.S. and Global Hedge Funds Advisory & Venture Capital CEO-CTO Teams Mentor, he has pioneered Silicon Valley-Wall Street-Pentagon Digital CEO-CTO Practices, Technologies, and Networks from world’s first-foremost-largest Global Digital Transformation Networks to New York State IDEA Award recognized Pentagon-USAF MVP Global Post AI-Quantum Networks pioneering Future of Finance and Trading practices as Trillion-Dollar Wall Street Hedge Funds and Investment Banks leader.