Malware Source Code Leaks
The inadvertent or purposeful exposure of malware source code can be a boon for cyber security researchers, but also a catalyst for the spread of more sophisticated malicious software. This chapter examines several significant historical incidents of malware source code leaks and the consequent implications for cyber security. It provides an in-depth look at how leaks occur, the information that can be gleaned from them, and how these leaks have spurred the development of more advanced malware tricks. You will gain insights into real-life malware and learn how to analyze leaked code for offensive purposes.
In this chapter, we’re going to cover the following main topics:
- Understanding malware source code leaks
- The impact of source code leaks on the malware development landscape
- Significant examples of malware source code leaks