Crowd Sourced Malware Reverse Engineering Platform Launched 19
wiredmikey writes "Security startup CrowdStrike has launched CrowdRE, a free platform that allows security researchers and analysts to collaborate on malware reverse engineering. CrowdRE is adapting the collaborative model common in the developer world to make it possible to reverse engineer malicious code more quickly and efficiently. Collaborative reverse engineering can take two approaches, where all the analysts are working at the same time and sharing all the information instantly, or in a distributed manner, where different people work on different sections and share the results. This means multiple people can work on different parts simultaneously and the results can be combined to gain a full picture of the malware. Google is planning to add CrowdRE integration to BinNavi, a graph-based reverse engineering tool for malware analysis, and the plan is to integrate with other similar tools. Linux and Mac OS support is expected soon, as well."
Re:sounds like a good way (Score:5, Insightful)
Re:A response (Score:5, Insightful)
That's one of the things I'm wary of in this context: You might piss someone off with more money and firepower than $deity when you pluck apart his precious and expensive weapon to fight terrorism (or is that boggeyman outdated by now and we have another strawman to justify spying on otherwise innocent citizens? I didn't keep up to date).
The other is that malware isn't the only thing you can reverse engineer, and that some companies might not be very interested in seeing their latest DRM junk being debunked in seconds.
Re:A response (Score:4, Insightful)
That's one of the things I'm wary of in this context: You might piss someone off with more money and firepower than $deity when you pluck apart his precious and expensive weapon to fight terrorism (or is that boggeyman outdated by now and we have another strawman to justify spying on otherwise innocent citizens? I didn't keep up to date).
I imagine that there isn't an entirely zero chance of earning yourself a dose of succulent Polonium for your tea; but I wouldn't be too concerned. If $SINISTER_INTELLIGENCE_AGENCY has cooked up some malware, and that malware has been tactless enough to get to the point of being reverse engineered in public(as opposed to being unnoticed, or covertly picked apart by the enemy $SINISTER_INTELLIGENCE_AGENCY), that malware is already too high profile for their liking. At that point, the options are (1): Start developing something else, do your best to suggest that your previous work was probably just Ukranian bot-herders or (2): Risk drawing even more attention to yourself by seeing to it that some security researchers mysteriously cut several vital arteries while shaving.