Cyber attacks waged by well-resourced and highly skilled groups have become the new normal. NTRIG takes a scientific and analytical approach to the dissection and interdiction of malware so the industry can execute without living in fear.
The analysis of raw data to formulate a deep understanding of its meaning and how it can be used.
The process of reverse engineering and dissecting malware tools to understand their capabilities.
A deep examination of data to contextualize its relevance and formulate actionable intelligence.
The analysis of raw data to formulate a deep understanding of its meaning and how it can be used.
The process of reverse engineering and dissecting malware tools to understand their capabilities.
A deep examination of data to contextualize its relevance and formulate actionable intelligence.
Our approach to TRIG was to build a high-performance team comprised of the world’s best talent in three key competencies: Intelligence Analysis, Malware Analysis/Reverse Engineering, and Data Science / Application Development. By fusing these three areas of expertise into a tightly knit team, Novetta TRIG produced reports, products, and actionable defense tools against various classes of cyber threats.
A Novetta-led coalition of private industry partners joined together to track, locate and disable the Lazarus Group, the malicious threat actors behind the 2014 Sony Pictures attack. Our story demonstrates private industry’s new role in ensuring the balance of global cyber defense.
Operation SMN was a Novetta-led industry coalition designed to disrupt known malicious tools used by the threat actor group Axiom.
On 15 October 2014, Novetta and the Cyber Security Coalition behind Operation SMN published an Executive Summary discussing the Axiom threat actors and their operations over the last several years. Also available, on behalf of the Operation SMN Coalition, Novetta published the full technical and behavioral reporting associated with Operation SMN. This report explores the structure, potential motivations, and tactics of the Axiom threat actor.