This is a team work analysis, we have at least 5 (five) members involved with this investigation.
The case that is about to be explained here is an APT case. Until now, we were (actually) avoiding APT cases for publicity in Malware Must Die! posts. But due to recent progress in "power-abuse using malware" cases, we improved our policy, so for several cases fit to "condition", i.e. malware crafted by "powerful actors with budget" aiming weak victims including the APT method, are going to analyze along w/public threat in this blog too.
more here..........http://blog.malwaremustdie.org/2014/08/another-country-sponsored-malware.html
The case that is about to be explained here is an APT case. Until now, we were (actually) avoiding APT cases for publicity in Malware Must Die! posts. But due to recent progress in "power-abuse using malware" cases, we improved our policy, so for several cases fit to "condition", i.e. malware crafted by "powerful actors with budget" aiming weak victims including the APT method, are going to analyze along w/public threat in this blog too.
more here..........http://blog.malwaremustdie.org/2014/08/another-country-sponsored-malware.html