SHARE
Facebook X Pinterest WhatsApp

Digital Fingerprints Track Malware Authors

Jun 23, 2010

In a presentation at July’s Black Hat security conference, HBGary CEO Greg Hoglund will talk about how to use what he calls the development fingerprints in malware to track down attackers.

Tracing those code artifacts back to attackers can lead to the minds behind the malware economy, according to HBGary CEO Greg Hoglund. In a talk at the upcoming Black Hat conference in Las Vegas, Hoglund will discuss how his new tool, dubbed Fingerprint.exe, can be used to help organizations gather intelligence about malware authors.

The approach has more scalability and is likely to detect more malware variants than other methods, he said. While malware authors can mutate their malware binaries to make it difficult for traditional anti-virus signatures to keep up, development fingerprints relate to the way the code was written – something not easily changed by the developer, he explained.

To read the original eWeek article, click here: Tracking Malware Authors’ Digital Fingerprints

Recommended for you...

Top Container Software Available in 2022
Don Hall
Aug 25, 2022
Coda vs Notion: Which Is Better For Project Management?
Don Hall
Aug 15, 2022
Wrike vs Asana: 2022 Comparison
Madeline Clarke
Jul 26, 2022
Top Version Control Tools in 2022
Don Hall
Jul 20, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.