Pat Belcher, Invincea’s Director of Security Analytics, has performed an in-depth analysis of the Putter Panda intrusion set using the Cynomix platform. In the analysis, Cynomix clearly shows there is no code-sharing relationship between Putter Panda and the APT1 malware samples. Leveraging CrowdSource’s automatic capability detection, his analysis with Cynomix also identifies the capabilities for each of the Putter Panda malware samples.
Check out Pat Belcher’s full report to see the entire analysis of Putter Panda.
About the Author
Bridging the gap between the impossible and the practical with innovative technology solutions in cyber, data science, mobile, microelectronics and information operations and a full spectrum of products and capabilities to advance national security missions.
About two six
Resources
- Resource Library
Copyright © 2024 Two Six Technologies, Inc. All rights reserved