Trawling the honeypot: What it’s like to discover a new malware strain

Media Thumbnail
00:00
00:00
1x
  • 0.5
  • 1
  • 1.25
  • 1.5
  • 1.75
  • 2
This is a podcast episode titled, Trawling the honeypot: What it’s like to discover a new malware strain. The summary for this episode is: <p>Being a malware reverse engineer isn’t always glamorous work. You spend a lot of time digging through junk emails.&nbsp;&nbsp;</p><p>&nbsp;</p><p>But when you find something in there—well, that’s a whole different story.&nbsp;&nbsp;</p><p>&nbsp;</p><p>On this episode of Security Intelligence, X-Force Malware Reverse Engineer Raymond Joseph Alfonso tells us about the time he discovered a curious new malware loader in the honeypot. And that leads to a bigger conversation about how hackers hide malicious code from view—and some of the new techniques they’re cooking up to stay hidden.&nbsp;</p><p>&nbsp;</p><p><em>The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.</em>&nbsp;</p><p>&nbsp;</p><p>Learn more about QuirkyLoader →<strong><em> </em></strong><a href="https://www.ibm.com/think/x-force/ibm-x-force-threat-analysis-quirkyloader" rel="noopener noreferrer" target="_blank">https://www.ibm.com/think/x-force/ibm-x-force-threat-analysis-quirkyloader</a>&nbsp;&nbsp;</p><p>&nbsp;Follow the Security Intelligence podcast on your preferred platform → <a href="https://www.ibm.com/think/podcasts/security-intelligence" rel="noopener noreferrer" target="_blank">https://www.ibm.com/think/podcasts/security-intelligence</a>&nbsp;</p>

DESCRIPTION

Being a malware reverse engineer isn’t always glamorous work. You spend a lot of time digging through junk emails.  

 

But when you find something in there—well, that’s a whole different story.  

 

On this episode of Security Intelligence, X-Force Malware Reverse Engineer Raymond Joseph Alfonso tells us about the time he discovered a curious new malware loader in the honeypot. And that leads to a bigger conversation about how hackers hide malicious code from view—and some of the new techniques they’re cooking up to stay hidden. 

 

The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. 

 

Learn more about QuirkyLoader → https://www.ibm.com/think/x-force/ibm-x-force-threat-analysis-quirkyloader  

 Follow the Security Intelligence podcast on your preferred platform → https://www.ibm.com/think/podcasts/security-intelligence