<img src="https://ws.zoominfo.com/pixel/JrRu3vUM8j33QSR7Bwxw" width="1" height="1" style="display: none;">
October 29, 2020 at 1:00 PM EDT

How to Think Like a Reverse Engineer: An Inside Look Into Analyzing Taidoor

How to Think Like a Reverse Engineer

Todays Reverse Engineers have a daunting task - stay ahead of new zero-day threats. Recent updates to the Taidoor RAT (remote access trojan) illustrate how successful malware tools, particularly ones proven successful in targeted nation state attacks, continue to evolve. And it also provides an opportunity for modern reverse engineers to extract malware configuration data, understand how these malware updates behave, and document the IOCs and TTPs.

Here's your opportunity to hear directly from a Reverse Engineer involved in analyzing the latest Taidoor RAT update. In this session, well discuss:

• What is the Taidoor RAT, and how is it being used in nation state attacks
• How to think like a Reverse Engineer, and apply the tools of the trade
• How to leverage existing malware samples to search for similar threats and hunt using YARA
• How to apply this new intelligence on Taidoor to actively update your defenses


Karlo Zanki, Reverse Engineer at ReversingLabs
Chip Epps, Director of Product and Solutions Marketing at ReversingLabs