In recent months, we built a profile of 2 prominent exploit developers — Volodya and PlayBit.
— Check Point Research (@_CPResearch_) October 2, 2020
Our blog post details our methodology and explains how we were able to fingerprint their exploits to ultimately track 16 Windows LPE exploits sold by them.https://t.co/xSMlLCZxX6
Fascinating must-read in exploitation market and intelligence!!! https://t.co/BPfDcXJQpN
— Gil Dabah (@_arkon) October 2, 2020
A really interesting research, giving a rare insight into the cyber crime “exploit market”.
— Yaniv Balmas (@ynvb) October 2, 2020
Kudos @EyalItkin @megabeets_ https://t.co/sc6Uc9p8Tu
Researchers use ‘fingerprints’ to track Windows exploit developers https://t.co/VSKwsWBObe
— The Cyber Security Hub™ (@TheCyberSecHub) October 2, 2020
Researchers track malware developers through fingerprints https://t.co/ST4p3U0E3B
— Nicolas Krassas (@Dinosn) October 3, 2020
Researchers track #malware developers through fingerprints.
— Stéphane Nappo (@StephaneNappo) October 2, 2020
? https://t.co/bkqIxfKm6k#Profiling #CyberSecurity #forensic #Infosec #CISO #ReverseEngineering pic.twitter.com/pjaklmUEzp
? This, not only will allow #cybersecurity professionals to know who's behind a specific exploit but also know of all other exploits that those specific actors developed! ?
— Anonymous??️ ?? (@YourAnonRiots) October 3, 2020
https://t.co/RLBwuJMUOQ#OSINT #InfoSec #Malware #CyberCrime #WhiteHat
Excited to publish our research in which @EyalItkin and I were able to fingerprint 2 of the most active exploit developers for Windows. Together, they account for 16 Windows LPE exploits, of which 5 were 0-Days that were sold to APTs and crime groups.https://t.co/st9WazaKQ7
— Itay Cohen? (@megabeets_) October 2, 2020
Hunting for exploits by looking for the author’s fingerprints : https://t.co/lo2K5WkxpJ credits @megabeets_ || @EyalItkin pic.twitter.com/JvmNM5z7AL
— Binni Shah (@binitamshah) October 2, 2020
Graphology of an Exploit – Hunting for exploits by looking for the author’s fingerprintshttps://t.co/fA63STcm0v
— raptor (@0xdea) October 2, 2020
Researchers Fingerprint Exploit Developers Who Help Several Malware Authors #hacking https://t.co/pmmGINjtxC
— Claudia Martín (@CLAVDIAmartin) October 2, 2020
Researchers Fingerprint Exploit Developers Who Help Several Malware Authors https://t.co/rZ10WoWzLg #Cyberattacks #DataPrivacy
— Aghiath chbib (@AghiathChbib) October 2, 2020
? This is really Interesting!
— Anonymous??️ ?? (@YourAnonRiots) October 3, 2020
Researchers fingerprint two Exploit Developers—"#Volodya" (BuggiCorp) & "#PlayBit"—who sold over a dozen Windows exploits to several cyber criminals & #malware authors in recent years.
https://t.co/vIzwkF4ZOI#infosec #cybersecurity
Who to trust? ?Researchers Fingerprint #Exploit Developers Who Help Several #Malware Authors #cyberattacks #CyberSecurity #osint #infosec #hackers #darkweb #privacy #databreaches #cybercrime #cybersec #ThreatIntel #dataprivacy #cyberintelligencehttps://t.co/W09INlUTLZ
— Jiniba (@JinibaBD) October 2, 2020
Researchers Fingerprint Exploit Developers Who Help Several Malware Authors https://t.co/GLeHCd54Ve#CyberSecurity #digital #Hackers #infosec @reach2ratan #malware #cloud #cloudsecurity #dataprotection #Privacy #infosec pic.twitter.com/drTWGNKbBN
— Ratan Jyoti (@reach2ratan) October 2, 2020
Graphology of an #Exploit – Hunting for exploits by looking for the author’s #fingerprints|#infosec #infosecurity #cyber #cybersecurity #cybersec #ReverseEngineering #fingerprinthttps://t.co/5cEjR9zLsc
— CarlosAndres Agudelo (@agudeloandres) October 3, 2020