Sign up for our daily briefing
Make your busy days simpler with Axios AM/PM. Catch up on what's new and why it matters in just 5 minutes.
Stay on top of the latest market trends
Subscribe to Axios Markets for the latest market trends and economic insights. Sign up for free.
Sports news worthy of your time
Binge on the stats and stories that drive the sports world with Axios Sports. Sign up for free.
Tech news worthy of your time
Get our smart take on technology from the Valley and D.C. with Axios Login. Sign up for free.
Get the inside stories
Get an insider's guide to the new White House with Axios Sneak Peek. Sign up for free.
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Want a daily digest of the top Denver news?
Get a daily digest of the most important stories affecting your hometown with Axios Denver
Want a daily digest of the top Des Moines news?
Get a daily digest of the most important stories affecting your hometown with Axios Des Moines
Want a daily digest of the top Twin Cities news?
Get a daily digest of the most important stories affecting your hometown with Axios Twin Cities
Want a daily digest of the top Tampa Bay news?
Get a daily digest of the most important stories affecting your hometown with Axios Tampa Bay
Want a daily digest of the top Charlotte news?
Get a daily digest of the most important stories affecting your hometown with Axios Charlotte
Illustration: Rebecca Zisser/Axios
In March the National Security Agency released an internal malware research tool for free to the public, a first for the secretive agency. Six months later, by most indications, the release is an even bigger event than the NSA thought.
Why it matters: Some aspects of researching malware have long required expensive software. The release of Ghidra, the NSA tool, has profoundly changed the field, opening it up to students, part-timers and hobbyists who otherwise couldn't afford to participate.
It's been a good six months for Ghidra. The software has been downloaded more than 500,000 times from GitHub.
- "We had a bet on how many downloads it would be," Brian Knighton, senior researcher at the NSA, told Axios. "We were off by quite a factor."
- Ghidra also netted the NSA two nominations for "Pwnie" awards at the typically NSA-adverse DEF CON hacker conference this week.
- The NSA was also pleasantly surprised with the number of outside developers modifying code and creating new features for the now open-source program.
- The toolkit is popular enough that the NSA now offers touring classes on Ghidra for colleges and universities.
The big picture: It's still too early to judge Ghidra's success based on its use in published malware research or incidents in which hackers have been thwarted. But based on engagement of new and old researchers alike, that kind of evidence seems likely to follow.
The background: Ghidra is a reverse-engineering tool that allows researchers to translate computer-executable programs into human-readable programming language commands.
When Ghidra was released, observers speculated that the purpose of the release was to create a global research explosion to counter national threats.
- That was certainly one NSA goal. But another that's been overlooked is cutting down the training time for NSA recruitment.
- “Now we can hire someone who has already used Ghidra,” said Knighton.
Knighton will present an update on Ghidra at the Black Hat cybersecurity conference Thursday, including new NSA-developed features and answers to some of the lingering questions about the program.
- “We’ll explain why we called it 'Ghidra',” said Knighton, which is still an open question, beyond the fact that King Ghidra is a formidable rival of Godzilla.
- More practically, the conference talk will address the choice to design the program in Java, a programming language that some experts now view as cumbersome and dated.