Connect with us

business

Morocco’s Airports Get World Cup Ready with Historic Infrastructure Push

Published

on

Morocco’s Airports Get World Cup Ready with Historic Infrastructure Push

RABAT — July 26, 2025
Under the roar of departing jets and the hum of anticipation, Morocco is charting its course skyward. As part of its commitment to co-host the 2030 FIFA World Cup alongside Spain and Portugal, the Moroccan government has announced a 38 billion dirham (~$4.2 billion USD) investment over the next five years to expand and modernize its primary airports.

The initiative will focus on five major aviation gateways: Casablanca Mohammed V International, Marrakech Menara, Rabat-Salé, Tangier Ibn Battuta, and Agadir Al Massira. Collectively, these upgrades are set to double Morocco’s air traffic capacity—from 38 million to 80 million passengers annually by the end of the decade.

“This is more than infrastructure,” said Mohamed Abdeljalil, Morocco’s Minister of Transport and Logistics. “It’s a statement to the world that Morocco is ready—not only to welcome football fans, but to drive economic growth and regional leadership in aviation and tourism.”


🏗️ What’s Included in the Investment?

The breakdown of the MAD 38 billion investment is twofold:

  • 25 billion dirhams will be directed toward expansion projects, including the construction of a new passenger terminal at Casablanca capable of handling an additional 20 million travelers.
  • 13 billion dirhams will go toward maintenance, infrastructure renewal, and land acquisition for airport development.

The Casablanca Mohammed V Airport—already the busiest in the country—is expected to become a central hub in Africa, offering world-class amenities, smart border processing, and expanded long-haul flight capacity.


🧍🏽‍♂️ Human Impact: Jobs, Opportunity, and Regional Equity

The airport modernization plan is expected to create more than 10,000 jobs in construction, engineering, logistics, and tourism services. For cities like Tangier, Agadir, and Rabat, expanded air access will open the door to increased business travel, hotel development, and cultural exchange.

“With better air links, we’ll see more tourists explore Morocco’s diversity—from the Atlantic coast to the Atlas Mountains,” said Fatima Zahra Bennis, head of the Moroccan Tourism Federation. “This investment will empower local economies and showcase our hospitality.”

Rural areas connected to these cities stand to benefit from enhanced logistics corridors, with small businesses gaining greater access to export markets and global tourism flows.


🌍 Strategic Value: A Hub for Africa and the Mediterranean

Beyond the World Cup, Morocco’s airport expansion is tied to its Vision 2030 strategy to become a leading African trade and transportation hub. With strategic proximity to Europe and sub-Saharan Africa, Morocco is betting big on aviation to support foreign investment, cargo logistics, and sustainable tourism.

The upgrades are expected to integrate biometric boarding, AI-powered traffic control, and solar-powered facilities, aligning with Morocco’s push for green and smart infrastructure.

“We’re not just upgrading terminals. We’re building the future of Moroccan connectivity,” said Dr. Rachid Tlemçani, a regional planning analyst. “This will define the next 50 years of our development.”


⚽ 2030 FIFA World Cup: A National Milestone

The 2030 tournament will be historic—the first ever World Cup jointly hosted across two continents. Morocco’s cities are expected to host group stage and knockout matches, welcoming hundreds of thousands of fans.

Airport upgrades will be essential to:

  • Streamline visitor arrivals with smart immigration systems
  • Enable direct international flights to cities like Agadir and Fez
  • Handle increased air cargo for broadcasters, teams, and sponsors
  • Connect fans to high-speed rail and urban transport networks

📈 Economic Outlook

According to the Moroccan High Commission for Planning, this project could:

  • Increase GDP by up to 0.8% annually over five years
  • Support growth in tourism revenue, potentially exceeding MAD 130 billion (~$14 billion USD) by 2030
  • Catalyze foreign direct investment in aviation and hospitality

business

Imposter IT on Teams Opens the Door to Enterprise Compromise

Published

on

Imposter IT on Teams Opens the Door to Enterprise Compromise


A new campaign weaponizes trust in collaboration tools. Attackers pose as IT on Microsoft Teams, coax employees into remote access, and run PowerShell that pulls a loader exploiting CVE-2025-26633 in Microsoft Management Console. The flaw—now added to CISA’s KEV—lets a malicious .msc run when its benign twin is launched. Patch and tighten verification controls immediately.

A social-engineering wave is turning Microsoft Teams into a beachhead. Adversaries masquerade as internal help-desk staff, request remote access, and execute PowerShell that fetches a loader which plants twin .msc files. When mmc.exe opens the legitimate console, Windows loads the attacker’s EvilTwin from the MUIPath directory, handing over code execution.

“Social engineering remains one of the most effective tools… attackers impersonate IT support, gain trust and remote access, and ultimately deploy suspicious tools,” Trustwave SpiderLabs reported. Trustwave

  • Initial access via Teams impersonation. Operators send Teams requests as “IT” and guide the user into a remote session.
  • PowerShell loader. Typical first command: powershell.exe -ExecutionPolicy Bypass … Invoke-RestMethod … runner.ps1 | iex, which drops twin .msc files.
  • Exploit: CVE-2025-26633 / “MSC EvilTwin”—an MMC security-feature bypass that prioritizes a localized .msc in MUIPath (e.g., en-US) over the benign one. Patched by Microsoft in March 2025; listed by CISA KEV.
  • Payloads and tooling. Fickle Stealer for data theft; SilentCrystal (Go loader) abusing Brave Support as a dropper; SOCKS5 backdoor for C2.
  1. The lure: A user accepts a Teams contact from “IT Support.” A remote session starts.
  2. Command drop: Attacker runs a single PowerShell line (ExecutionPolicy Bypass) that downloads runner.ps1 from cjhsbam[.]com.
  3. EvilTwin setup: The script writes two identically named .msc files; the malicious copy sits in …\System32\en-US (or a mock “C:\Windows␠\System32” with a trailing space), then mmc.exe loads the malicious one first.
  4. Post-exploit: Persistence, AES-encrypted tasking over C2, and optional info-stealing via Fickle Steal
  • Trust channel abuse: Users expect help-desk on Teams; the UI looks familiar. Prior research shows Teams vishing has delivered RATs and ransomware before.
  • Living-off-the-land: PowerShell + signed Windows binaries (mmc.exe) keep telemetry subtle.
  • Path precedence edge case: The MUIPath lookup lets a malicious localized .msc hijack execution—now patched, but effective on lagging fleets.

“Treat every ‘IT support’ request in Teams as untrusted until proven otherwise. Make users verify out-of-band, and make admins verify the OS. If your estate isn’t patched for CVE-2025-26633, you’re one click away from handing attackers mmc.exe on a silver platter. Block the social angle, patch the technical angle, and hunt for ExecutionPolicy Bypass like your business depends on it—because it does.” — El Mostafa Ouchen

Immediate actions (enterprise)

1) Patch priority

  • Deploy March 2025 Windows updates that remediate CVE-2025-26633 across client and server. Validate compliance in WSUS/Intune/ConfigMgr; confirm exposure via MSRC / NVD.

2) Harden Teams trust boundaries

  • Restrict External Access to allow-list domains; disable unsolicited chats from unknown tenants.
  • Create a help-desk verification policy: no remote control unless the user initiates via the corporate portal/ticket, plus callback via a known internal number. (Microsoft and industry advisories consistently warn about tech-support impersonation.)
  • PowerShell: alert on -ExecutionPolicy Bypass, Invoke-RestMethod, DownloadString, or Invoke-Expression launched from Teams, Teams.exe child, or interactive sessions.
  • MMC/EvilTwin indicators:
    • mmc.exe loading .msc from MUIPath (…\System32\en-US*.msc) or paths with trailing spaces (e.g., C:\Windows␠\System32).
    • Unexpected writes to localized .msc directories.
    • New .msc files followed by immediate mmc.exe execution.

Sample KQL (Microsoft Defender XDR)

4) Reduce blast radius

  • Enforce ASR rules (e.g., block Office/Win32 child processes), Constrained Language Mode where feasible, and Device Control to prevent unauthorized admin tools.
  • WDAC/AppLocker: explicitly allow only known-good .msc; deny execution from localized resource folders and user-writable paths.

5) People & process

  • Run an awareness micro-module: “Never accept unsolicited remote-access on Teams. Verify via ticket + callback.”
  • Table-top a scenario: help-desk impersonation → PowerShell dropper → MMC exploit → C2.

Indicators & context

  • Domains/paths seen: cjhsbam[.]com, rivatalk[.]net, safesurf.fastdomain-uoemathhvq.workers.dev; twin .msc technique; AES-tasking over C2; SilentCrystal loader; SOCKS5 backdoor.
  • Attribution & scope: EncryptHub (aka LARVA-208 / Water Gamayun) active since 2024; >600 orgs claimed impacted in reporting.

The bigger picture

Abuse of “work-trusted” channels (Teams, Slack, Quick Assist) is now routine in ransomware and stealer operations. Recent cases show Teams vishing setting up RAT installs and “support” sessions that end in domain compromise. The platform isn’t the problem; trust without verification is.

Bottom line

This campaign fuses social engineering with a Windows path-precedence quirk. If you patch CVE-2025-26633, lock down Teams external contact, verify support out-of-band, and hunt for Bypass-heavy PowerShell, you turn a high-probability breach into a blocked pop-up.

One-Page SOC Playbook (Teams “Request Remote Access” abuse)

Detect, contain, and prevent Teams-led social engineering that results in malicious .msc execution and data theft.

1) Patch & Exposure

  • Deploy the March 2025 Windows updates addressing CVE-2025-26633 to all supported builds.
  • Verify posture via WSUS/Intune/ConfigMgr compliance reports; track exceptions with a 48-hour SLA.

2) Microsoft Teams Guardrails

  • External Access: Move to allow-list of trusted tenants; disable unsolicited chats from unknown domains.
  • Support workflow: No remote control unless initiated from the corporate portal/ticket, plus callback verification from a published internal number.
  • Education: 10-minute module: “Never accept unsolicited remote access.”

3) Detections to Enable (Microsoft Defender XDR – KQL)

A. PowerShell dropper patterns (bypass + web fetch):

B. Teams as the launchpad (PowerShell child of Teams):

C. MMC loading suspicious .msc (localized folders / path tricks):

D. Unexpected .msc file writes (resource folders):

4) Containment & Hardening

  • Isolate device in EDR if any rule above fires + user confirms unsolicited “IT” contact.
  • Revoke tokens (AAD sign-ins, OAuth grants) and reset credentials from a known-clean host.
  • ASR rules: Block abuse of LOLBins (Office child processes, script abuse); audit → enforce.
  • WDAC/AppLocker: Allowlist known-good .msc; deny execution from localized resource folders and user-writable paths.
  • PowerShell CLM where feasible; log Script Block/Module events to SIEM.

5) Comms & Aftercare

  • Notify impacted users; provide a one-page “verify IT requests” reminder.
  • Run retro hunt for the past 30–60 days with the KQL above; export findings for IR.
  • Add the scenario to quarterly table-top: Teams impersonation → remote session → PowerShell → MMC hijack.

KPIs: Patch compliance ≥98% within 72h; zero unsolicited remote-access approvals; MDE detections triaged <1h; mean-time-to-isolation <15m.

Sources:

  • CyberSecurityNews: Teams impersonation + remote access flow and runner.ps1 details. Cyber Security News
  • Trustwave SpiderLabs: technical breakdown (EvilTwin, MUIPath precedence, SilentCrystal, IOCs). Trustwave
  • Trend Micro: CVE-2025-26633 “MSC EvilTwin” analysis and Water Gamayun/EncryptHub link. Trend Micro
  • NVD/MSRC: CVE-2025-26633 description and references. NVDMicrosoft Security Response Center
  • CISA: KEV listing/alert for CVE-2025-26633. CISA
  • Fortinet: Fickle Stealer capabilities/background. Fortinet
Continue Reading

business

All in One: Morocco’s Official Online Platforms at Your Fingertips

Published

on

All in One: Morocco’s Official Online Platforms at Your Fingertips

RABAT, Morocco — Morocco’s government is expanding a network of official digital platforms designed to deliver key public services to citizens inside the country and Moroccans living abroad. The centralized portals aim to reduce bureaucracy, cut in-person visits, and make vital documents and applications available online.

Core Platforms for All Citizens

Maroc.ma – The kingdom’s official gateway offers information on state institutions and direct access to a growing list of e-services for residents and expatriates.

Rokhas – A unified digital platform for obtaining building permits, renovation approvals, and business activity licenses without visiting municipal offices.

Chikaya – An online complaint portal allowing citizens to file grievances, submit suggestions, and track responses from public administrations.

Tawtik – An electronic system for notarial transactions, streamlining interactions between notaries, tax offices, and property registries.

Wraqi – A platform to book appointments and request administrative documents such as national ID renewals and certificates, with real-time application tracking.

Idarati – A comprehensive guide to administrative procedures, offering downloadable forms and access to select online services.

Casier Judiciaire – Enables citizens to request criminal record certificates remotely from anywhere in the world, without appearing in court.

Youth-Oriented Services

Pass Jeune – A youth card and mobile app launched by the Ministry of Youth, Culture, and Communication, offering discounts and free access to cultural, sports, and transportation services, as well as housing and training opportunities.

Moutawaa – A national volunteering platform connecting young people to service projects and skill-building programs.

Broader Digital Ecosystem

The portals link to a wide directory of Moroccan ministries and agencies, covering justice, foreign affairs, finance, health, transport, education, agriculture, telecommunications, customs, taxation, intellectual property, logistics, social security, and infrastructure.

The impact: By unifying public services online, Morocco aims to streamline government-citizen interactions, support the needs of Moroccans abroad, and encourage broader adoption of digital tools.

Infographic displaying nine QR codes for Morocco’s official e-government portals, including Maroc.ma, Rokhas, Chikaya, Tawtik, Wraqi, Idarati, Casier Judiciaire, Pass Jeune, and Moutawaa. Each portal is labeled with its name and website URL, arranged in a clean three-by-three grid.
Infographic of Morocco’s official e-government portals, with QR codes and direct links for services including permits, complaints, legal records, and youth programs—accessible to citizens and Moroccans living abroad.

More Info:

Continue Reading

business

From Potatoes to Paleontology: Morocco’s Big Wins on August 14, 2025

Published

on

From Potatoes to Paleontology: Morocco’s Big Wins on August 14, 2025


Morocco’s potato exports surged after a five-year slump, paleontologists uncovered the country’s oldest Turiasaurian teeth in the Middle Atlas, and UIR teamed with Cisco on a new AI & cybersecurity center. Authorities also approved the Amazigh name “Massinissa,” Morocco beat Zambia 3–1 at CHAN, and DV-2025 lottery winners sounded alarms over stalled interviews. FreshPlazaMorocco World News+3Morocco World News+3Morocco World News+3Hespress

The Briefing

Morocco’s news cycle on August 14, 2025 offered a snapshot of a country diversifying—export recovery in agri-food, frontier science with Jurassic-era finds, digital capacity-building through a new AI/cyber hub, and a culture-rights win on Amazigh naming—rounded off by a CHAN victory and visa-processing anxieties for DV-2025 winners. FreshPlazaMorocco World News+3Morocco World News+3Morocco World News+3Hespress

Economy — Potatoes Are Back

After five years of decline, Morocco’s ware-potato exports rebounded to 42,900 tons worth US$14.9 million between July 2024 and May 2025—a 5.7× increase versus the prior season. Analysts credit renewed West African trade links and firmer European demand. The uptick helps farmers and cold-chain logistics while testing resilience ahead of the 2025–26 campaign. FreshPlaza

Explainer takeaway: A stronger potato campaign increases rural incomes and stabilizes supply chains; monitoring fertilizer prices, shipping rates, and weather will indicate whether the rebound is durable.

Science — 160-Million-Year-Old Giants

Researchers identified three dinosaur teeth from the Middle Atlas (El Mers III Formation), marking the oldest evidence of Turiasauria on mainland Africa—a Middle Jurassic lineage previously best known from Iberia. The peer-reviewed study tightens biogeographic links between North Africa and Europe and invites fresh fieldwork in Boulemane province. Morocco World NewsYabiladiResearchGate

Explainer takeaway: Morocco’s Jurassic strata continue to fill global fossil gaps, boosting scientific tourism and training opportunities for local geoscience programs.

Technology — UIR × Cisco Unveil AI & Cybersecurity Center

The International University of Rabat (UIR) and Cisco signed an MoU to create a Cisco EDGE Incubation Center focused on AI and cybersecurity, aligning with Morocco’s Digital 2030 ambitions. The hub aims to link academia, startups, and public services while leveraging Cisco Networking Academy pathways. Morocco World NewsMap NewsMedafrica TimesLinkedIn

Explainer takeaway: Expect new pipelines for SOC talent, secure-cloud skills, and AI safety research—areas where Morocco seeks digital sovereignty and exportable know-how.

Society — A Win for Amazigh Naming Rights

Following an initial refusal, Meknes authorities approved the Amazigh name “Massinissa.” The reversal reflects ongoing normalization of Amazigh names in civil registry practice and reduces administrative friction for families seeking culturally rooted identities. Morocco World NewsHespressFacebook

Explainer takeaway: Documentation shapes access to education, healthcare, and travel; clearer acceptance of Amazigh names streamlines everyday life and affirms linguistic rights.

Sport — CHAN Boost: Morocco 3–1 Zambia

Morocco’s locally based national team defeated Zambia 3–1, strengthening its CHAN 2024 (played in 2025) campaign and securing a quarterfinal berth. Wins at CHAN raise player visibility, support domestic leagues, and can lift transfer valuations for homegrown talent. Hespress

Explainer takeaway: CHAN is a showcase for domestic football systems; Morocco’s result supports the broader talent pipeline from Botola clubs to continental competition.

Migration — DV-2025 Interview Delays

DV-2025 lottery winners in Morocco report stalled interview scheduling at the U.S. Consulate in Casablanca as the September 30, 2025 fiscal-year deadline nears, raising fears that selectees could time out despite “current” case numbers. Civil-society calls urge transparent scheduling and capacity updates. Morocco World News

Explainer takeaway: Diversity Visas are time-bound; absent appointments by the end of the fiscal year, eligibility ends—even for qualified selectees. Applicants should ensure DS-260s are complete and monitor consular notices.

What to Watch Next

  • Agri-exports: Does the potato rally carry into Q4 logistics and pricing? FreshPlaza
  • Science & tourism: Will new Middle Atlas digs expand fossil trails and museum programs? Morocco World News
  • Talent & tech: Can the UIR–Cisco hub seed startups and feed national SOC capacity by 2026? Morocco World News
  • Civil registry: Are further Amazigh naming cases resolved consistently across regions? Hespress
  • CHAN: Injury management and fatigue as fixtures compress. Hespress
  • DV-2025: Any scheduling updates from Casablanca before Sept. 30. Morocco World News

Continue Reading

Trending

Copyright 2024 / Mag212