Written by Jamie Harries and Dan Meyer, Crowdstrike
"Recent findings highlight this cluster’s extensive knowledge of telecommunications protocols, including the emulation of these protocols to facilitate command and control (C2) and utilizing scanning/packet-capture tools to retrieve highly specific information from mobile communication infrastructure, such as subscriber information and call metadata."
Click above for the full article, and remember to check back for more insights from B.K. Gogia himself and others in the industry.
Comments