Joseph Fleming
Malware Reverse Engineer at PhishLabs- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Experience
-
PhishLabs
-
United States
-
IT Services and IT Consulting
-
1 - 100 Employee
-
Malware Reverse Engineer
-
Jan 2018 - Apr 2020
Remote - Fully automated processing of Trickbot to extract command and control data and targets. - Reverse Engineered various malware banking trojans to determine functionality for both Windows Desktop and Android mobile platforms. - Developed dozens of python scripts to decode and decrypt data sections of different malware samples. - Created blog articles, videos and and malware analysis presentations for clients.
-
-
-
-
Threat Intelligence Research / Reverse Engineer
-
Oct 2015 - Feb 2017
- Tracked daily threat data collected from internal and external sources, including spam traps, honey nets and subscription services. - Reverse engineered hundreds of malware samples to retrieve domains, IP addresses, strings and configuration data. - Wrote automated Locky ransomware configuration extractor in Python. Processed nearly two thousand Locky binaries to retrieve configuration data and track campaign trends. - Created Yara rule based tracking system to monitor threats… Show more - Tracked daily threat data collected from internal and external sources, including spam traps, honey nets and subscription services. - Reverse engineered hundreds of malware samples to retrieve domains, IP addresses, strings and configuration data. - Wrote automated Locky ransomware configuration extractor in Python. Processed nearly two thousand Locky binaries to retrieve configuration data and track campaign trends. - Created Yara rule based tracking system to monitor threats submitted to VirusTotal and feed data to SIEM. - Wrote over 100 Yara rules to monitor for recent threat submissions covering ransomware, banking and POS threats. - Authored a dozen technical articles for internal use, blog articles as well as threat reports delivered to clients. Show less
-
-
-
-
Senior Computer Scientist
-
Oct 2014 - Oct 2015
Menlo Park, CA Analyzed 8 SIM card brands for vulnerabilities using side-channel power analysis and fuzzing. Developed scripts in Python to communicate with SIM cards.
-
-
-
General Dynamics
-
United States
-
Defense and Space Manufacturing
-
700 & Above Employee
-
Advanced Reverse Engineer
-
Jun 2013 - Jun 2014
- Successfully developed, in three months, a test platform to simulate a nation-wide communications network, which others were unable to develop over the prior year. - Maintained and upgraded java code and SQL procedures for a large-scale network visualization tool. - Analyzed dozens of malware files and attended GREM course. - Demonstrated test cases using Metasploit to run against network vulnerabilities.
-
-
-
-
Computer Scientist
-
Feb 2005 - 2012
Malware Research Create Rootkit Detection Mechanisms Develop Hardware Assisted Hypervisor Reverse engineer binaries Ida Pro, windbg, Ollydbg...
-
-
-
US Navy
-
United States
-
Armed Forces
-
700 & Above Employee
-
Officer
-
2002 - 2005
Currently in the reserves.
-
-
Education
-
Michigan State University
Master's degree, Computer Science -
Michigan State University
Bachelor's degree, Computer Science -
National Cryptologic Officer Basic Course
Three month course on national security.