Cambridge Franchise Holdings, LLC North Carolina / Memphis...

Page 1

Cambridge​ ​Franchise​ ​Holdings,​ ​LLC​ ​North Carolina​ ​/​ ​Memphis Keep​ ​reading​ ​and​ ​you​ ​will​ ​see​ ​the​ ​Burger​ ​King​ ​/​ ​Malware​ ​connection.​ ​Keep​ ​in​ ​mind​ ​this all​ ​started​ ​with​ ​“Robert​ ​Suddeth”​ ​in​ ​Portsmouth​. Cambridge​ ​Franchise​ ​Holdings,​ ​LLC​ ​owns​ ​and​ ​operates​ ​restaurants,​ ​convenience​ ​stores, and​ ​real​ ​estate​ ​properties.​ ​The​ ​company​ ​was​ ​founded​ ​in​ ​2014​ ​and​ ​is​ ​based​ ​in​ ​Henderson, North​ ​Carolina.​ ​Cambridge​ ​Franchise​ ​Holdings,​ ​LLC​ ​is​ ​looking​ ​for​ ​acquisition opportunities.​ ​Cambridge​ ​Franchise​ ​plans​ ​continued​ ​growth​ ​in​ ​the​ ​Southeast​ ​through acquisitions​ ​and​ ​remodels​ ​of​ ​existing​ ​restaurants​ ​and​ ​development​ ​of​ ​new​ ​restaurants. (now​ ​Memphis) Which​ ​takes​ ​us​ ​back​ ​to​ ​North​ ​Carolina​ ​again... Cambridge​ ​Franchise​ ​Holdings,​ ​LLC 208​ ​North​ ​Garnett​ ​Street Henderson,​ ​NC​ ​27536 (901)​ ​930-0700


United​ ​States Founded​ ​in​ ​2014 With​ ​all​ ​of​ ​the​ ​shell​ ​companies​ ​and​ ​fake​ ​personas​ ​are​ ​always​ ​had​ ​an​ ​attachment​ ​to​ ​some person​ ​of​ ​minor​ ​historical​ ​significance​ ​such​ ​as​​ ​King​ ​William​ ​Henry​ ​III​,​ ​Robert​ ​Sudduth (an​ ​actor​ ​on​ ​Days​ ​of​ ​Our​ ​Lives) “With​ ​this​ ​acquisition,​ ​we​ ​now​ ​own​ ​and​ ​operate​ ​all​ ​Burger​ ​King​ ​restaurants​ ​in​ ​the Memphis​ ​Area,”​ ​said​ ​Ray​ ​Meeks​,​ ​CEO​ ​of​ ​Cambridge​ ​Franchise​ ​Holdings.​ ​“We​ ​are​ ​excited to​ ​work​ ​together​ ​with​ ​our​ ​new​ ​team​ ​members​ ​and​ ​are​ ​committed​ ​to​ ​maintaining​ ​our​ ​high standards​ ​of​ ​operations.”​ ​Added​ ​Marshall,​ ​“Ray​ ​and​ ​the​ ​Cambridge​ ​team​ ​have​ ​been​ ​a pleasure​ ​to​ ​work​ ​with.​ ​I​ ​wish​ ​them​ ​the​ ​best​ ​of​ ​luck​ ​and​ ​know​ ​that​ ​these​ ​restaurants​ ​and employees​ ​are​ ​in​ ​great​ ​hands.” Cambridge​ ​Franchise​ ​Holdings​ ​now​ ​operates​ ​over​ ​100​ ​Burger​ ​King®​ ​Restaurants.​ ​The Company​ ​is​ ​one​ ​of​ ​Burger​ ​King’s®​ ​largest​ ​and​ ​fastest​ ​growing​ ​franchisees. About​ ​Cambridge​ ​Franchise​ ​Holdings Cambridge​ ​Franchise​ ​Holdings​ ​was​ ​formed​ ​in​ ​2014​ ​by​ ​Matt​ ​Perelman​ ​and​ ​Alex​ ​Sloane​ ​in partnership​ ​with​ ​Ray​ ​Meeks,​ ​a​ ​30-year​ ​Burger​ ​King®​ ​franchisee​ ​and​ ​seasoned​ ​restaurant operator.​ ​The​ ​Company​ ​is​ ​led​ ​by​ ​Chief​ ​Executive​ ​Officer​ ​Ray​ ​Meeks,​ ​Chief​ ​Operating Officer​ ​Tim​ ​Furr,​ ​Chief​ ​Financial​ ​Officer​ ​Kevin​ ​Whitton,​ ​VP​ ​of​ ​Operations​ ​Chris​ ​Schniepp and​ ​Chief​ ​Development​ ​Officer​ ​Joey​ ​Stewart.​ ​Cambridge​ ​Franchise​ ​Holdings​ ​owns​ ​and operates​ ​101​ ​Restaurants,​ ​5​ ​Convenience​ ​Stores​ ​and​ ​real​ ​estate​ ​in​ ​Alabama,​ ​Arkansas, Louisiana,​ ​Mississippi,​ ​North​ ​Carolina,​ ​Tennessee​ ​and​ ​Virginia.​ ​The​ ​Company​ ​aims​ ​to grow​ ​its​ ​restaurants​ ​and​ ​its​ ​team​ ​through​ ​consistent,​ ​high​ ​quality,​ ​profitable​ ​operations.


Now​ ​take​ ​this​ ​amazing​ ​coincidence…

Fuck​ ​you​ ​asshole...stop​ ​fucking​ ​with​ ​my​ ​doc!! Same​ ​name,​ ​company,​ ​North​ ​Carolina​ ​connection​ ​AND​ ​an​ ​interest​ ​in​ ​malware…


Overview Dive deep into real world malware events. Tear them apart. Unwrap the layers of obfuscation. Find the exploit. Protect your network. Explore exploits kits and ransomware.​ ​ ​Join​ ​the​ ​fun​ ​and​ ​make​ ​the​ ​world​ ​a​ ​little​ ​safer. This course is designed to take you deep into all stages of a malware attack – from delivery to the final payload. You will learn the tools and techniques necessary to perform​ ​exhaustive​ ​analysis​ ​on​ ​modern​ ​malware.

Who​ ​Should​ ​Attend

Anyone​ ​wishing​ ​to​ ​dig​ ​into​ ​malware​ ​on​ ​a​ ​deeper​ ​level

Key​ ​Learning​ ​Objectives

How​ ​to​ ​pull​ ​real-world​ ​malware​ ​apart.

Preequisite​ ​Knowledge

None-​ ​but​ ​some​ ​background​ ​in​ ​programming​ ​and​ ​architecture​ ​will​ ​be​ ​helpful.

Hardware​ ​/​ ​Software​ ​Requirements

Bring a laptop with VMware Workstation, Player, or Fusion installed. Be sure you have plenty​ ​of​ ​RAM​ ​and​ ​Disk​ ​space​ ​to​ ​run​ ​the​ ​supplied​ ​VM.

Agenda DAY​ ​1​ ​–​ ​Performing​ ​Malware​ ​Analysis ● Performing​ ​open​ ​source​ ​intelligence​ ​gathering​ ​–​ ​strings,​ ​hashes​ ​and​ ​VirusTotal ● Static and Dynamic analysis: monitoring tools, sandboxes, parsing tools and more ● Understanding delivery mechanisms: Office documents, JavaScript attachments and​ ​the​ ​use​ ​of​ ​social​ ​media ● Digging into Exploit Kits: Anatomy of a server compromise and the initial stages of​ ​an​ ​attack ● Using​ ​Next-Gen​ ​Security​ ​Tools,​ ​like​ ​Bromium DAY​ ​2​ ​–​ ​Distribution​ ​Methods​ ​and​ ​Exploit​ ​Kits ● Unraveling​ ​Exploit​ ​Kit​ ​obfuscation​ ​–​ ​digging​ ​deeper​ ​into​ ​EK​ ​infrastructure ● Finding​ ​the​ ​exploit​ ​–​ ​analyzing​ ​malicious​ ​browser​ ​plugins ● Analyzing​ ​the​ ​exploit ● Advanced malware analysis – leveraging debuggers and IDA Pro to enhance analysis ● Identifying​ ​packing​ ​and​ ​other​ ​code​ ​obfuscation​ ​techniques DAY​ ​3​ ​–​ ​Advanced​ ​Analysis​ ​Techniques


● Malware​ ​use​ ​of​ ​Shellcode​ ​–​ ​extracting​ ​and​ ​analyzing ● Anti-Analysis​ ​techniques​ ​and​ ​how​ ​to​ ​defeat​ ​them ● Malware​ ​Persistence ● Analyzing​ ​other​ ​file​ ​formats​ ​–​ ​looking​ ​at​ ​executables​ ​that​ ​utilize​ ​byte-code ● Detecting​ ​EKs​ ​in​ ​the​ ​Wild​ ​–​ ​techniques​ ​for​ ​detection​ ​and​ ​prevention ● Gathering​ ​Indicators​ ​of​ ​Compromise​ ​–​ ​Making​ ​the​ ​world​ ​a​ ​safer​ ​place! So,​ ​let​ ​us​ ​see

Who​ ​describes​ ​herself​ ​as… As​ ​a​ ​self-motivated​ ​Information​ ​Security​ ​Professional,​ ​I​ ​enjoy​ ​working​ ​in​ ​a​ ​fast​ ​paced, highly​ ​motivating​ ​position​ ​where​ ​I​ ​can​ ​assist​ ​others​ ​while​ ​challenging​ ​and​ ​expanding​ ​my knowledge​ ​and​ ​understanding​ ​of​ ​the​ ​task​ ​at​ ​hand.​ ​My​ ​goals​ ​are​ ​to​ ​grow​ ​and​ ​prosper​ ​in an​ ​environment​ ​that​ ​places​ ​this​ ​emphasis​ ​and​ ​excellence​ ​towards​ ​improving​ ​information security​ ​and​ ​information​ ​security​ ​methodology.​ ​I​ ​look​ ​to​ ​build​ ​a​ ​strong​ ​business relationship​ ​with​ ​the​ ​company​ ​and​ ​clients;​ ​and​ ​exceed​ ​expectations​ ​to​ ​excel​ ​within​ ​the company. Technical​ ​Proficiencies: DLP​ ​Policy​ ​Design​ ​and​ ​Tuning DLP​ ​Architecture/Engineering •​ ​Data​ ​at​ ​Rest​ ​(Storage) •​ ​Data​ ​in​ ​Motion​ ​(Network) •​ ​Data​ ​in​ ​Use​ ​(​Endpoint​) DLP​ ​Incident​ ​Analysis DLP​ ​System​ ​Baseline/Health​ ​Check Endpoint​ ​Management​ ​(Anti-Virus) Security​ ​Awareness SSL​ ​Certificates

Now​ ​let’s​ ​do​ ​a​ ​reverse​ ​search​ ​on​ ​Mr.​ ​Sudduth​:

Michael​ ​Sudduth 3rd​ ​degree​ ​connection​ ​3rd


Information​ ​Security​ ​Professional Cambridge​ ​Franchise​ ​Holdings,​ ​LLC ITT​ ​Technical​ ​Institute-Cordova Greater​ ​Memphis​ ​Area Full​ ​Name Michael​ ​W​ ​Sudduth May​ ​also​ ​go​ ​by M​ ​Sudduth Michael​ ​Sudduth Micheal​ ​W​ ​Sudduth Age 43 Current​ ​Address 960​ ​Tomlin​ ​Rd. Somerville,​ ​TN​ ​38068 901)​ ​465-9801

(901)​ ​465-2884 (901)​ ​465-5801 (901)​ ​619-5801 (901)​ ​466-1710 \(901)​ ​326-5536

vortexdealr@aol.com president@memphisissa.org m.sudduth@ymail.com memphisinfosec@gmail.com memphisissa@gmail.com msudduth@gateway.net msesudduth@aol.com msudduth@att.blackberry.net msudduth69@gmail.com


The​ ​query​ ​returns​…



Same​ ​name,​ ​NC​ ​connection,​ ​right​ ​age,​ ​and​ ​an​ ​interest​ ​in​ ​hacking…



Google​ ​reverse​ ​image​ ​search​ ​didn’t​ ​help​ ​me​ ​much​ ​there,​ ​but​ ​clearly​ ​the​ ​trail​ ​was​ ​leading back​ ​to​ ​North​ ​Carolina. Which​ ​I​ ​did... Who​ ​way​ ​or​ ​may​ ​not​ ​be​ ​Scott​ ​Nelson​ ​of​ ​Patterson​ ​California​,​ ​they​ ​look​ ​quite​ ​similar…


So​ ​that​ ​leads​ ​be​ ​back​ ​to​ ​what​ ​I​ ​thought​ ​all​ ​along,​ ​but​ ​I​ ​am​ ​not​ ​stupid​ ​enough​ ​to​ ​think think​ ​I’ve​ ​met​ ​my​ ​last​ ​“Sudduth”.​ ​Since​ ​“Lee”​ ​used​ ​as​ ​a​ ​middle​ ​name​ ​in​ ​so​ ​many​ ​on​ ​his personas,​ ​if​ ​I​ ​could​ ​find​ ​a​ ​“Lee​ ​Sudduth”​ ​in​ ​his​ ​early​ ​40’s​ ​the​ ​North​ ​Carolina​ ​triangle​ ​area that​ ​HAS​ ​to​ ​be​ ​our​ ​guy​ ​and​ ​guess​ ​what…


Lee​ ​Sudduth

SA​ ​at​ ​Cisco​ ​Systems Cisco​ ​Systems Warren​ ​Wilson​ ​College Raleigh-Durham,​ ​North​ ​Carolina​ ​Area 275​ ​275​ ​connections And​ ​despite​ ​a​ ​fairly​ ​decent​ ​LinkedIn,​ ​to​ ​google​ ​image​ ​search​ ​brought​ ​back​ ​stock photography,​ ​and​ ​a​ ​Google​ ​search​ ​for​ ​the​ ​same​ ​person​ ​and​ ​company​ ​brings​ ​back nothing.


MORE​ ​INFO: https://goo.gl/mwm6h9 https://goo.gl/ZZgKUA https://goo.gl/1DqXd8 https://goo.gl/cyCuYn https://goo.gl/LJry6n https://goo.gl/LJry6n https://goo.gl/SASgGn https://goo.gl/LNL35K https://goo.gl/ACz9aE https://goo.gl/PS7Mc9 https://goo.gl/kfD7Ex https://goo.gl/kBMkKM https://goo.gl/RCG1SN https://goo.gl/YJwfXu


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.