


Some of the explanations for these similarities highlighted by Kaspersky’s report include: The algorithm used to generate victim UIDs, the extensive usage of the FNV-1a hash and the sleeping algorithm of both the backdoors are some of the major similarities found between Kazuar and Sunburst.ĭespite these similarities, the extent of the similarities and nature of the relationship is still unclear.
