Click here to download all references as Bib-File.
2021-02-22 ⋅ Check Point Research ⋅ The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day |
2021-02-22 ⋅ Check Point Research ⋅ The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day APT31 |
2020-12-17 ⋅ Twitter (@megabeets_) ⋅ Tweet on SUNBURST malware discussing some of its evasion techniques SUNBURST |
2020-10-26 ⋅ Checkpoint ⋅ Exploit Developer Spotlight: The Story of PlayBit Dyre Maze PyLocky Ramnit REvil |
2020-10-02 ⋅ Check Point Research ⋅ Graphology of an Exploit – Hunting for exploits by looking for the author’s fingerprints |
2019-04-24 ⋅ Check Point Research ⋅ Deobfuscating APT32 Flow Graphs with Cutter and Radare2 Salgorea |
2018-11-30 ⋅ Check Point ⋅ The Evolution of BackSwap BackSwap |
2018-08-20 ⋅ Check Point ⋅ Ryuk Ransomware: A Targeted Campaign Break-Down Ryuk |
2018-05-21 ⋅ MegaBeets ⋅ Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1 DROPSHOT |