Security research tool had security problem
Security researchers and the networks they rely on were at risk of breach by the hackers they investigate, thanks to now mitigated man-in-the-middle holes in a popular plugin for analysing debugger OllyDbg.
The debugger disassembles binaries, making it a handy way to understand an application's workings without having access to source code. Those abilities mean OllyDbg is often found in malware investigators' toolkits.
ForcePoint special investigations head Andy Settle found two man-in-the-middle holes within the StrongOD anti-evasion OllyDbg plugin that is installed on some 750,000 machines, writing the findings in the paper The Freeman Report. Identified users include researchers at US-based Carnegie Mellon University, the campus IT shop for Britain's University of Warwick, and Australia's University of New South Wales.