-
-
This is precisely one use case for mcsema. Ex, identify the C2 module in a piece of malware, lift it out, patch it into your own code.
-
I'm sure you could stitch together a full program from found parts. Like, grab a webcam module from here, and a keylogger from there, etc
-
Sure. But it's easier to write your own. Repurposing malware -- especially binaries in the field -- is way harder than writing from scratch.
-
Not so sure. The military can't even hire enough operators let alone developers. They could have experts design an automated system once.
-
Automating malware repurposing sounds even harder than doing it once for a specific op. Not least of which each malware has its own protocol
-
Writing implants is ~ easy. A first year CS undergrad can do it. I know maybe half a dozen folks who could credibly repurpose malware.
-
Yeah but what if you want to create unique implants at scale? Or want measurable effects on attribution or signature avoidance?
-
By em from defence contractors and startups. Cheaper and safer :)
- 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.