Cambridge Franchise Holdings, LLC North Carolina / Memphis Keep reading and you will see the Burger King / Malware connection. Keep in mind this all started with “Robert Suddeth” in Portsmouth. Cambridge Franchise Holdings, LLC owns and operates restaurants, convenience stores, and real estate properties. The company was founded in 2014 and is based in Henderson, North Carolina. Cambridge Franchise Holdings, LLC is looking for acquisition opportunities. Cambridge Franchise plans continued growth in the Southeast through acquisitions and remodels of existing restaurants and development of new restaurants. (now Memphis) Which takes us back to North Carolina again... Cambridge Franchise Holdings, LLC 208 North Garnett Street Henderson, NC 27536 (901) 930-0700
United States Founded in 2014 With all of the shell companies and fake personas are always had an attachment to some person of minor historical significance such as King William Henry III, Robert Sudduth (an actor on Days of Our Lives) “With this acquisition, we now own and operate all Burger King restaurants in the Memphis Area,” said Ray Meeks, CEO of Cambridge Franchise Holdings. “We are excited to work together with our new team members and are committed to maintaining our high standards of operations.” Added Marshall, “Ray and the Cambridge team have been a pleasure to work with. I wish them the best of luck and know that these restaurants and employees are in great hands.” Cambridge Franchise Holdings now operates over 100 Burger King® Restaurants. The Company is one of Burger King’s® largest and fastest growing franchisees. About Cambridge Franchise Holdings Cambridge Franchise Holdings was formed in 2014 by Matt Perelman and Alex Sloane in partnership with Ray Meeks, a 30-year Burger King® franchisee and seasoned restaurant operator. The Company is led by Chief Executive Officer Ray Meeks, Chief Operating Officer Tim Furr, Chief Financial Officer Kevin Whitton, VP of Operations Chris Schniepp and Chief Development Officer Joey Stewart. Cambridge Franchise Holdings owns and operates 101 Restaurants, 5 Convenience Stores and real estate in Alabama, Arkansas, Louisiana, Mississippi, North Carolina, Tennessee and Virginia. The Company aims to grow its restaurants and its team through consistent, high quality, profitable operations.
Now take this amazing coincidence…
Fuck you asshole...stop fucking with my doc!! Same name, company, North Carolina connection AND an interest in malware…
Overview Dive deep into real world malware events. Tear them apart. Unwrap the layers of obfuscation. Find the exploit. Protect your network. Explore exploits kits and ransomware. Join the fun and make the world a little safer. This course is designed to take you deep into all stages of a malware attack – from delivery to the final payload. You will learn the tools and techniques necessary to perform exhaustive analysis on modern malware.
Who Should Attend
Anyone wishing to dig into malware on a deeper level
Key Learning Objectives
How to pull real-world malware apart.
Preequisite Knowledge
None- but some background in programming and architecture will be helpful.
Hardware / Software Requirements
Bring a laptop with VMware Workstation, Player, or Fusion installed. Be sure you have plenty of RAM and Disk space to run the supplied VM.
Agenda DAY 1 – Performing Malware Analysis ● Performing open source intelligence gathering – strings, hashes and VirusTotal ● Static and Dynamic analysis: monitoring tools, sandboxes, parsing tools and more ● Understanding delivery mechanisms: Office documents, JavaScript attachments and the use of social media ● Digging into Exploit Kits: Anatomy of a server compromise and the initial stages of an attack ● Using Next-Gen Security Tools, like Bromium DAY 2 – Distribution Methods and Exploit Kits ● Unraveling Exploit Kit obfuscation – digging deeper into EK infrastructure ● Finding the exploit – analyzing malicious browser plugins ● Analyzing the exploit ● Advanced malware analysis – leveraging debuggers and IDA Pro to enhance analysis ● Identifying packing and other code obfuscation techniques DAY 3 – Advanced Analysis Techniques
● Malware use of Shellcode – extracting and analyzing ● Anti-Analysis techniques and how to defeat them ● Malware Persistence ● Analyzing other file formats – looking at executables that utilize byte-code ● Detecting EKs in the Wild – techniques for detection and prevention ● Gathering Indicators of Compromise – Making the world a safer place! So, let us see
Who describes herself as… As a self-motivated Information Security Professional, I enjoy working in a fast paced, highly motivating position where I can assist others while challenging and expanding my knowledge and understanding of the task at hand. My goals are to grow and prosper in an environment that places this emphasis and excellence towards improving information security and information security methodology. I look to build a strong business relationship with the company and clients; and exceed expectations to excel within the company. Technical Proficiencies: DLP Policy Design and Tuning DLP Architecture/Engineering • Data at Rest (Storage) • Data in Motion (Network) • Data in Use (Endpoint) DLP Incident Analysis DLP System Baseline/Health Check Endpoint Management (Anti-Virus) Security Awareness SSL Certificates
Now let’s do a reverse search on Mr. Sudduth:
Michael Sudduth 3rd degree connection 3rd
Information Security Professional Cambridge Franchise Holdings, LLC ITT Technical Institute-Cordova Greater Memphis Area Full Name Michael W Sudduth May also go by M Sudduth Michael Sudduth Micheal W Sudduth Age 43 Current Address 960 Tomlin Rd. Somerville, TN 38068 901) 465-9801
(901) 465-2884 (901) 465-5801 (901) 619-5801 (901) 466-1710 \(901) 326-5536
vortexdealr@aol.com president@memphisissa.org m.sudduth@ymail.com memphisinfosec@gmail.com memphisissa@gmail.com msudduth@gateway.net msesudduth@aol.com msudduth@att.blackberry.net msudduth69@gmail.com
The query returns…
Same name, NC connection, right age, and an interest in hacking…
Google reverse image search didn’t help me much there, but clearly the trail was leading back to North Carolina. Which I did... Who way or may not be Scott Nelson of Patterson California, they look quite similar…
So that leads be back to what I thought all along, but I am not stupid enough to think think I’ve met my last “Sudduth”. Since “Lee” used as a middle name in so many on his personas, if I could find a “Lee Sudduth” in his early 40’s the North Carolina triangle area that HAS to be our guy and guess what…
Lee Sudduth
SA at Cisco Systems Cisco Systems Warren Wilson College Raleigh-Durham, North Carolina Area 275 275 connections And despite a fairly decent LinkedIn, to google image search brought back stock photography, and a Google search for the same person and company brings back nothing.
MORE INFO: https://goo.gl/mwm6h9 https://goo.gl/ZZgKUA https://goo.gl/1DqXd8 https://goo.gl/cyCuYn https://goo.gl/LJry6n https://goo.gl/LJry6n https://goo.gl/SASgGn https://goo.gl/LNL35K https://goo.gl/ACz9aE https://goo.gl/PS7Mc9 https://goo.gl/kfD7Ex https://goo.gl/kBMkKM https://goo.gl/RCG1SN https://goo.gl/YJwfXu