RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Products & TechnologyFebruary 6, 2018

Sifting Files for Cyber

Guest blog by Edvard Amoroso, Founder and CEO of TAG Cyber

FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
Sifting Files for Cyber

I’ve always considered end-of-file (EOF) to be an effective bumper block for programs – one that helps executing code from over-running its rails. New programmers especially like the condition, as it provides a simple target for defining when a computing task is complete: Read and interpret the file until you’ve hit EOF, at which point you are done. It’s an elegant concept, and it reminds us how important file formats are to the programs that process them.

Cyber security experts understand the critical role of file formats and analysis in preventing malware infections. That is, to avoid being hit with malware, you must first learn to spot it, and file analysis is a useful method for such determination: Read and interpret the file until you’re convinced it’s not malware, at which point you are done. This is foundational in our discipline, but it’s much easier said than done – if only because your adversary knows you’ll be doing it.

I spent a couple of delightful hours recently with the principals of ReversingLabs, a fascinating cyber security company headquartered in Cambridge, Massachusetts. One of the primary focus areas for the company involves high speed automated file analysis that makes analysts and response teams more efficient and effective, but can also be deployed to evaluate millions of email, web and shared files per day in real-time. It’s impressive technology.

The team shared with me their solution approach, which involves storing the results of file analysis in a database to support historical searches by file attribute. The goal is to speed the incident response, analysis, and hunting tasks, which is a critical enterprise requirements. Their unique technology is based on a technique called active file decomposition, which breaks down a file rapidly and supports determination of malware presence at scale.

“We support real-time file and object analysis based on rule definitions that allow analysts to quickly and accurately classify potential malware samples,” explained Mario Vuksan, the Founder and CEO of ReversingLabs. Vuksan, who is a frequent presenter at conferences such as Black Hat, was also previously head of technology development at Bit9. “This capability not only helps the analyst, but also makes existing cyber security product solutions much better.”

One embedded capability is a signature-based open source tool called YARA. Analysts can deploy custom YARA rules using ReversingLabs solutions to pattern-match the contents of files or objects. For example, if law enforcement describes a new malware variant, then analysts can use the description to build YARA rules, and then use ReversingLabs to search for that malware in the local network. They can also use the YARA rule to rapidly update detection and control definitions in their existing security tools.

ReversingLabs offers a variety of appliances including one for malware analysis and hunting, and one for enterprise scale file analysis. Both make use of the company’s TitaniumCore technology for unpacking files and extracting threat indicators at near-real time speeds. It addresses typical blind spots by addressing a broad area of file types, including Windows, Linux, iOS, MacOS, Android, firmware, PDF, and other formats.

“We offer technology that helps enterprise teams extend beyond the original process of simply scanning files for viruses,” explained John Hanratty, Head of Marketing. “Analysts need high speed, in-depth tools to decide what indicators are important to extract from a file. We are currently working with SOCs, forensics teams, security analysts, and threat hunters to embed our capability into their operations.”

I was pleased to see that the company recently completed a sizable Series A round of funding, including participation from JPMorgan Chase. This funding will be used to support growth, with emphasis on practical delivery of TitaniumCore technology to enterprise teams via appliances. “Initially designed for government,” Hanratty said, “we are using the investment to expand our solutions usability and capabilities to meet the needs of Fortune 500 companies.” He added that ReversingLabs is an In-Q-Tel portfolio company.

If you have the need for efficient file analysis for email, web, cloud, or on-premises based resources, then you ought to review the ReversingLabs solution offerings. And when you contact them for a technical briefing, make sure to inquire about their reputation services as well. This seems a nice complement for any enterprise doing advanced analysis of files and objects for indicators of malware.

Good luck, and let us all know what you learn.
https://www.linkedin.com/pulse/sifting-files-cyber-edward-amoroso/


Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Products & Technology

More Blog Posts

QR Code Phishing Is Evolving: Here’s How Your Detection Can Keep Up

QR Code Phishing Evolves: How to Keep Up

Here's what you need to know about the rise of quishing — and how your threat hunting team can get out in front of it.

Learn More about QR Code Phishing Evolves: How to Keep Up
QR Code Phishing Evolves: How to Keep Up
Why RL Built Spectra Assure Community

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Learn More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community
How a Simple YARA Rule Catches What AV Misses

ClickFix: YARA Rules Catch What AV Misses

Learn about the antivirus detection gap — and how to develop a simple YARA rule using Spectra Analyze.

Learn More about ClickFix: YARA Rules Catch What AV Misses
ClickFix: YARA Rules Catch What AV Misses
Polyglot File Examination with Spectra Analyze

How to Examine Polyglot Files with Spectra Analyze

Here's how to assess a sample using Spectra Analyze in your environment — and create a YARA rule.

Learn More about How to Examine Polyglot Files with Spectra Analyze
How to Examine Polyglot Files with Spectra Analyze

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top