Russian state-sponsored actors have meddled in elections, blacked out power grids, hacked the Olympics, and unleashed NotPetya, one of the most destructive worms in history. While notorious groups such as Turla, Sofacy, and APT29 have been well-documented, greater patterns have emerged when viewed as part of a larger threat ecosystem.
Intezer’s open-source interactive map: apt-ecosystem.com/russia/map/ reveals over 22,000 code connections between Russian hacker groups and their tools, from specific functions to entire modules.
This workshop will show how you can create your own code connections cluster for the threats that affect you. Mapping code connections between threats can accelerate the investigation of a large number of files, and support attribution and other threat intel/research projects.
Intezer’s Ari Eitan and CEO Itai Tevet, former Directors of the Israel Defense Force CERT, will explain how you can complement your existing malware investigation pipelines with Intezer’s API.
Learn more about the Genetic Software Mapping approach behind the project.