In the past I've discussed how central antivirus software "phone-back" URL locations can be easily used by U.S and international Intelligence Agencies including rogue nation-state or targeted threat actors for the purpose of hijacking them and feeding back malicious content similar to the U.S Intelligence Community's Top Secret program called "CAMBERDADA" which aims to collect malicious software samples from antivirus vendors which also includes Kaspersky using SIGINT by basically intercepting traffic courtesy of antivirus vendors and basically collecting the malicious software samples for research purposes.
No comments:
Post a Comment