>>5569062 (PB)
>CherryBlossom provides a means of monitoring the Internet activity of and performing software exploits on Targets of interest. In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals. Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices. Therefore these devices are the ideal spot for "Man-In-The-Middle" attacks, as they can easily monitor, control and manipulate the Internet traffic of connected users. By altering the data stream between the user and Internet services, the infected device can inject malicious content into the stream to exploit vulnerabilities in applications or the operating system on the computer of the targeted user.
>
>The wireless device itself is compromized by implanting a customized CherryBlossom firmware on it; some devices allow upgrading their firmware over a wireless link, so no physical access to the device is necessary for a successful infection. Once the new firmware on the device is flashed, the router or access point will become a so-called FlyTrap.
I think this could be related to Q522:
-D_CsTBA_YES[AUTH_H7^pZBVTZ7302-]
##FLY##
[OWLS]
HOT-1_pre_D
HOT-2_pre_D
HOT-3+
HOT-4_TERM_AUTHC-TVFCAZD-837392x
HOT-5_pre_D
HOT-6_pre_D
HOT-7_corr_TAXjV^-293Z
HOT-8_pre_D
HOT-9_pre_D
HOT-10_pre_D
HOT-11_pre_D
HOT-12_pre_D
AS THE WORLD TURNS.
HAPPY HUNTING.
P_PERS: WRWY [N1LB][FG&C]
Jeremiah 29:11
Q
##FLY## = FLYTRAP ?
W&W hacked DS [OWLS] HOTSPOTS? (HOT-1,2…)
In this case the stringer above could be commands but I still haven't found a comparable command into the CB manual: >>5568082 (PB)
Maybe some anon could help