Click here to download all references as Bib-File.•
2023-05-16
⋅
Check Point Research
⋅
The Dragon Who Sold his Camaro: Analyzing a Custom Router Implant Horse Shell Camaro Dragon |
2021-02-22
⋅
Check Point Research
⋅
The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day APT31 |
2021-02-22
⋅
Check Point Research
⋅
The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day |
2020-12-17
⋅
Twitter (@megabeets_)
⋅
Tweet on SUNBURST malware discussing some of its evasion techniques SUNBURST |
2020-10-26
⋅
Checkpoint
⋅
Exploit Developer Spotlight: The Story of PlayBit Dyre Maze PyLocky Ramnit REvil |
2020-10-02
⋅
Check Point Research
⋅
Graphology of an Exploit – Hunting for exploits by looking for the author’s fingerprints |
2019-04-24
⋅
Check Point Research
⋅
Deobfuscating APT32 Flow Graphs with Cutter and Radare2 Salgorea |
2018-11-30
⋅
Check Point
⋅
The Evolution of BackSwap BackSwap |
2018-08-20
⋅
Check Point
⋅
Ryuk Ransomware: A Targeted Campaign Break-Down Ryuk |
2018-05-21
⋅
MegaBeets
⋅
Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1 DROPSHOT |