Too Long; Didn't Read
Check Point's Vulnerability and Malware Research teams joined efforts to focus on the exploits inside the malware and specifically, on the exploit writers themselves. By analyzing the exploits embedded in malware samples, we can learn about the exploit authors by studying their coding habits and other fingerprints left as clues their products are written by. The malware developers for their part don’t really care how it works behind the scenes, they just want to integrate this module and be done with it. A cyber-espionage organization of a nation-state is likely to have hundreds or even thousands of employees in different groups and branches.