Honing Internetworking Things to Perfection ....... is Nothing New but is Radically Different*
Similarly, in 2013 FireEye noted that Taidoor's operators were using Yahoo! Blogs posts to host an encrypted form of the malware, making it easier to evade blocks and takedowns of C2 domains.
Methinks such is a Ubiquitous Vector [blog posts and commentard strings] and a Common Default Universal Standard for Transparent Internetional Use against/with deaf, dumb and blind/ignorant and arrogant command and control operands/retarded virtual machines?
And it is remarkably stealthy and easily not spotted until well after any means or memes of opposition or competition are realised as being necessary to protect and preserve and server the status quo ..... and that makes it increasingly valuable beyond compare, and there are very few programs/disruptive operating systems that would be able to truthfully boast that facility/utility/ability.
* :-) Some may realise it with IT as AI Fundamentalism, which is certainly bound to be dismissed and dumped on .... or pimped and pumped .... as too alien a concept for mainstream interest, which is yet another stealthy avenue to exploit and expand and experiment with.