The NSA publicly released a tool for cracking software wide open, and hackers are loving it — so long as the NSA makes good on its promise not to use it to spy on them

Nakasone cyber command

  • On Tuesday, the National Security Agency made its Ghidra — its tool for reverse-engineering software — available as open source, which means anyone can use or modify it for free.
  • Anybody can use it as a free cybersecurity tool for disassembling suspicious files, analyzing malware, and testing for vulnerabilities.
  • Since the Ghidra tool is free, this increases access for people to use it in both professional and educational settings — potentially making for a safer internet, even as it could introduce new people into the profession of cybersecurity, experts say. 
  • The NSA promises that there are no backdoors or other methods of spying built in to Ghidra, but hackers have gone over the code with a fine-tooth comb to double-check that claim. 

It's been almost a week since the National Security Agency released a free software tool for picking apart suspicious files, and security enthusiasts are already poring over the code to hunt for bugs and backdoors. And once the project's completely online for people to modify, developers will scramble to make this tool even more powerful, experts say.

On Tuesday, the NSA released an open source project called Ghidra, a software reverse engineering framework developed by NSA's Research Directorate for NSA's cybersecurity mission. The secretive spy agency originally developed Ghidra to analyze attacks and cybersecurity risks on government agencies and other organizations. Like individuals and companies, government agencies are also prone to cybersecurity attacks, including ones from other countries. 

Right now, the code is only available to download, but the NSA is in the process of putting the project onto code hosting site GitHub. And once that happens, experts expect to see enhancements from amateur and professional security developers roll out soon — making the tool even more robust, and a major reason why the NSA likely chose to release a formerly closed project, experts say. As an open source project, Ghidra can be used or modified by anyone for free.

In the meantime, the release of Ghidra has provoked a frenzy of activity as malware researchers, hobbyists and even the conspiracy-minded dissect the software and put it through its paces, assessing its capabilities and seeking to allay the inevitable suspicions about the spy agency's gift. 

"If you have security concerns about Ghidra, do what I do and install all your research tools inside a Virtual Machine," suggested MalWare Tech, a verified Twitter user with 141,000 followers.

Read more: A former Marine explains how her service helped prepare her to lead a new open source initiative for $3.3 billion startup Rubrik

Making Ghidra open source benefits NSA, experts say. It can be costly to work on improving Ghidra, but as an open source tool where anyone can modify it, an online community of developers can work to improve it much faster. It can also encourage recruitment and community interaction with th NSA, Graham says.

"The significance is that the product can be improved by the community instead of being solely funded by the NSA. Development of such a product is costly, and even the NSA doesn't have unlimited funds. It'll be great demonstration of the value of open-sourcing internally developed projects," Rob Graham, consultant and owner at Errata Security. told Business Insider in a Twitter DM.

What is reverse engineering?

Reverse engineering helps users recover information needed to understand cybersecurity risks. For example, when there's a suspicious file, it can be hard to find the specific issues with that file. But with reverse engineering, a person can disassemble the file to figure out how it works and what risks it might have — essentially, working backwards.

This is similar to figuring out how a dish is prepared at a restaurant so you can make it at home. With Ghidra, people can inspect suspicious code, analyze malware and test for vulnerabilities. 

Ghidra's technology isn't anything new as there are currently commercial reverse engineering tools available, but as an open source tool, it increases access for people to work with reverse engineering, says Jon Amato, research director for Gartner's technical professionals security and risk management strategies team.

"It lowers the bar for entry for people who can do reverse engineering in the industry and are frustrated and priced out for commercial tools," Amato told Business Insider.

Ghidra is not as sophisticated as some commercially available tools, Amato says, but it's still a "good first start" for people who want to get their hands dirty with reverse engineering. Plus, right now, commercial tools can cost thousands of dollars a year. Although the NSA has released a set of other open source projects, this is the first open source tool specifically for analyzing malicious code and malware-like viruses.

"This functionality has been in freeware and commercial based tools for years," Amato said. "The problem was commercial tools were crazy expensive. [Ghidra] competes with more commercial tools in that in can do a bunch of different stuff but it can do it for free.

Amato says that this tool isn't a general purpose security tool, but rather, a niche tool that would only be used in specialized security jobs. That being said, now that the tool is free, he believes that Ghidra will likely be used as a teaching tool in colleges and universities — giving students access to learning about this specialized type of cybersecurity technology.

"We'll start to see this used in academic classroom environments because some of the commercial tools can be a little difficult to gain licenses for even for academic environments," Amato said. "The learning ecosystem is going to be the first and most immediate change we'll see."

Skepticism

Still, some users were skeptical about the announcement. Ghidra has already been around for years, and it's likely that the NSA has replaced its internal tools for reverse engineering, says Jerry Gamblin, principal security engineer at Kenna Security.

"It was known to exist, and because it had lost internal value and it wasn't a tool that was going to drastically make the Internet safe, it allows them to give something back to the security community," Gamblin told Business Insider. "It's good timing for the NSA."

The fact that it's from the NSA may also deter some users from using this tool, but otherwise, since Ghidra's release, the security community has already started sifting through the code to try out the code and to look for bugs.

“There is no backdoor in Ghidra,” Robert Joyce, NSA senior advisor, said at RSA on Tuesday. “This is the last community you want to release something out to with a backdoor installed, to people who hunt for this stuff to tear apart.”

Here's what people are saying about Ghidra.

 

SEE ALSO: Microsoft is seriously closing the gap with Amazon in the cloud wars, according to a survey of IT professionals

Join the conversation about this story »

NOW WATCH: Here's how North Korea's Kim Jong Un became one of the world's scariest dictators



Contributer : Tech Insider https://ift.tt/2Trdz08
The NSA publicly released a tool for cracking software wide open, and hackers are loving it — so long as the NSA makes good on its promise not to use it to spy on them The NSA publicly released a tool for cracking software wide open, and hackers are loving it — so long as the NSA makes good on its promise not to use it to spy on them Reviewed by mimisabreena on Sunday, March 10, 2019 Rating: 5

No comments:

Sponsor

Powered by Blogger.