Hunting Exploits by looking for the Author’s fingerprints: Graphology of an Exploitby@checkpoint

Hunting Exploits by looking for the Author’s fingerprints: Graphology of an Exploit

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Check Point's Vulnerability and Malware Research teams joined efforts to focus on the exploits inside the malware and specifically, on the exploit writers themselves. By analyzing the exploits embedded in malware samples, we can learn about the exploit authors by studying their coding habits and other fingerprints left as clues their products are written by. The malware developers for their part don’t really care how it works behind the scenes, they just want to integrate this module and be done with it. A cyber-espionage organization of a nation-state is likely to have hundreds or even thousands of employees in different groups and branches.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Hunting Exploits by looking for the Author’s fingerprints: Graphology of an Exploit
Check Point Software HackerNoon profile picture

@checkpoint

Check Point Software


Receive Stories from @checkpoint

react to story with heart
Check Point Software HackerNoon profile picture
by Check Point Software @checkpoint.Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.
Visit us

RELATED STORIES

L O A D I N G
. . . comments & more!