paint-brush
Hunting Exploits by looking for the Author’s fingerprints: Graphology of an Exploitby@checkpoint

Hunting Exploits by looking for the Author’s fingerprints: Graphology of an Exploit

by Check Point Software22mJuly 28th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Check Point's Vulnerability and Malware Research teams joined efforts to focus on the exploits inside the malware and specifically, on the exploit writers themselves. By analyzing the exploits embedded in malware samples, we can learn about the exploit authors by studying their coding habits and other fingerprints left as clues their products are written by. The malware developers for their part don’t really care how it works behind the scenes, they just want to integrate this module and be done with it. A cyber-espionage organization of a nation-state is likely to have hundreds or even thousands of employees in different groups and branches.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Hunting Exploits by looking for the Author’s fingerprints: Graphology of an Exploit
Check Point Software HackerNoon profile picture
Check Point Software

Check Point Software

@checkpoint

Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

L O A D I N G
. . . comments & more!

About Author

Check Point Software HackerNoon profile picture
Check Point Software@checkpoint
Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here
Trom
Leftic
Moomoo
Learnrepo
Thetechstreetnow
Allella