Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security IT Technology

NSA's Free Malware Research Tool Gains Traction, 6 Months On (axios.com) 18

In March the National Security Agency released an internal malware research tool for free to the public, a first for the secretive agency. Six months later, by most indications, the release is an even bigger event than the NSA thought. From a report: Some aspects of researching malware have long required expensive software. The release of Ghidra, the NSA tool, has profoundly changed the field, opening it up to students, part-timers and hobbyists who otherwise couldn't afford to participate. It's been a good six months for Ghidra. The software has been downloaded more than 500,000 times from GitHub. "We had a bet on how many downloads it would be," Brian Knighton, senior researcher at the NSA, told Axios. "We were off by quite a factor."

Ghidra also netted the NSA two nominations for "Pwnie" awards at the typically NSA-adverse DEF CON hacker conference this week. The NSA was also pleasantly surprised with the number of outside developers modifying code and creating new features for the now open-source program. The toolkit is popular enough that the NSA now offers touring classes on Ghidra for colleges and universities.

This discussion has been archived. No new comments can be posted.

NSA's Free Malware Research Tool Gains Traction, 6 Months On

Comments Filter:
  • by jonwil ( 467024 ) on Friday August 09, 2019 @04:55PM (#59071934)

    Its not surprising it became so popular given how powerful it is and how great it is as an alternative to spending thousands of dollars on IDA Pro and the HexRays decompiler suite.

You are always doing something marginal when the boss drops by your desk.

Working...