
Blog Posts
3 Ransomware Defense Strategies
Ransomware is evolving. Not only are there more attackers due to ransomware as a service (RaaS) threats, but ransomware attack strategies are changing with data exfiltration extortions, which I will …
• By Marisa Midler
In Reverse Engineering For Malware Analysis

Using OOAnalyzer to Reverse Engineer Object Oriented Code with Ghidra
Object-oriented programs continue to pose many challenges for reverse engineers and malware analysts....
• By Jeffrey Gennari
In Reverse Engineering For Malware Analysis

Business Email Compromise: Operation Wire Wire and New Attack Vectors
In June 2018, Federal authorities announced a significant coordinated effort to disrupt business email compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals....
• By Anne Connell
In Reverse Engineering For Malware Analysis

Path Finding in Malicious Binaries: First in a Series
In a previous post, I discussed the Pharos Binary Analysis Framework and tools to support reverse engineering of binaries with a focus on malicious code analysis. Recall that Pharos is....
• By Jeffrey Gennari
In Reverse Engineering For Malware Analysis

Security Begins at the Home Router
In recent days, the VPNFilter malware has attracted attention, much of it in the wake of a May 25 public service announcement from the FBI, as well as a number …
• By Vijay Sarvepalli
In Reverse Engineering For Malware Analysis

Big-Data Malware: Preparation and Messaging
Part one of this series of blog posts on the collection and analysis of malware and storage of malware-related data in enterprise systems reviewed practices for collecting malware, storing it, …
• By Brent Frye
In Reverse Engineering For Malware Analysis

Big-Data Malware: Collection and Storage
The growth of big data has affected many fields, including malware analysis. Increased computational power and storage capacities have made it possible for big-data processing systems to handle the increased …
• By Brent Frye
In Reverse Engineering For Malware Analysis

Data Science, Blacklists, and Mixed-Critical Software: The Latest Research from the SEI
As part of an ongoing effort to keep you informed about our latest work, this blog posting summarizes some recently published SEI technical reports, white papers, and webinars in early …
• By Douglas C. Schmidt
In Reverse Engineering For Malware Analysis

Threat Analysis Mapping, Connected Vehicles, Emerging Technologies, and Cyber-Foraging: The Latest Research from the SEI
Recently published SEI reports highlight the latest work of SEI technologists in estimating program costs early in the development lifecycle, threat analysis mapping, risks and vulnerabilities in connected vehicles, emerging …
• By Douglas C. Schmidt
In Reverse Engineering For Malware Analysis

Static Identification of Program Behavior using Sequences of API Calls
Much of the malware that we analyze includes some type of remote access capability. In this post, I will explain how to statically characterize program behavior using application programming interface …
• By Jeffrey Gennari
In Reverse Engineering For Malware Analysis
