Hunting Exploits by looking for the Author’s fingerprints: Graphology of an Exploit

Written by checkpoint | Published 2021/07/28
Tech Story Tags: checkpoint | malware | malware-threat | exploit | web-security | security | vulnerability | good-company

TLDR Check Point's Vulnerability and Malware Research teams joined efforts to focus on the exploits inside the malware and specifically, on the exploit writers themselves. By analyzing the exploits embedded in malware samples, we can learn about the exploit authors by studying their coding habits and other fingerprints left as clues their products are written by. The malware developers for their part don’t really care how it works behind the scenes, they just want to integrate this module and be done with it. A cyber-espionage organization of a nation-state is likely to have hundreds or even thousands of employees in different groups and branches.via the TL;DR App

no story

Written by checkpoint | Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.
Published by HackerNoon on 2021/07/28