Title: ACNO Skill Levels: Malware Analysis & Reverse Engineering
Release Date: 2015-06-22
Description: This undated GCHQ training document details the requirements for analysts engaged in the reverse engineering of commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
ACNO Skill 12: Malware Analysis & Reverse Engineering
• Relevant Operating Systems.
• Current trends in attack vectors & targeted applications / protocols / services.
• Malware bootstraping, persistance, communication protocols and propagation
• Exploitation techniques (stack & heap overflows, XSS, SQL Injection, etc).
• Personal Security Products (Anti-Virus, HIDS, etc).
• Public and 5-eyes malware analysis tools.
• File formats and content verification tools.
• Anti-SRE, anti-debugging & anti-emulation techniques.
• Identify malicious code.
• Analyse and understand captured malware.
• Identify and construct signatures & heuristics for detection.
• Reverse engineer malware.
• Use IDA Pro to statically uncover and annotate functionality.
• Determine sophistication level of malware.
• Apply malware discovery tools and techniques.
• Develop malware discovery & analysis tools.
• Provide mitigation advice.
Understands basic concept of malware identification and analysis but does not yet
have the breadth of knowledge needed to apply this skill in an operational context.
Has basic understanding of attack vectors and impact of an infection.
Has knowledge of open-source and commercial SRE tools and techniques. Can
determine basic functionality of malware using these tools, but requires technical
guidance to go further.
Has detailed knowledge of internal and 5-eyes analysis tools, and how they operate.
Works unsupervised to high-level task definitions. Develops discovery and analysis
tools to enhance capability. Can determine main functionality of malware through
static analysis (i.e. SRE).
Provides technical direction and guidance to colleagues. Considered a known point
of reference in the field. Contributes to key architectural design decisions when
developing new capability. Displays advanced SRE skills, and uses experience to
provide accurate sophistication & impact assessments.
Considered an expert in the field of malware analysis, and a point of reference
throughout the intelligence community and possibly industry. Consistently delivers,
and leads the development of groundbreaking capability. Speaks at conferences and
1 of 2
This information is exempt from disclosure under the Freedom of Informatioj^c^OOO anc^riay be subject to exemption under
other UK information legislation. Refer disclosure requests to GCHQ on xj^jH (non-sec) or email §U@gchq
delivers specialised training in the field. Has a wealth of experience relating to
malware trends & evolving techniques.
2 of 2
This information is exempt from disclosure under the Freedom of Informatior^ç^OOO an^jjay be subject to exemption under
other UK information legislation. Refer disclosure requests to GCHQ on (non-sec) or email ^^|@gchq