Mark Felegyhazi

Mark Felegyhazi

Raleigh-Durham-Chapel Hill Area
6K followers 500+ connections

About

With over two decades of cybersecurity experience, I am a seasoned CEO and product…

Services

Activity

Join now to see all activity

Experience

Education

  • University of California, Berkeley Graphic

    University of California, Berkeley

    -

    Security researcher in the networking group
    • Developed a proactive domain name filtering to mitigate spam domain registrations
    • Studied measurement-based methods to disrupting spammer networks
    • Analysed strategic behavior in cyber insurance and proposed methods to incetivize secure behavior

  • -

    • Studied distributed and strategic decision-making in computer networks, specifically in cybersecurity
    • Devised methods to motivate participants in ad hoc networks to cooperate

  • -

    • Major in computer networking
    • Minor in mobile communication

  • -

    • Deutschpsrachige Engineurausbilding (1996 - 1999)

  • -

Projects

  • TeamSpy – Obshie manevri. Ispolzovat’ tolko s razreshenija S-a



    The CrySyS Lab, Budapest has been notified by the Hungarian National Security Authority (www.nbf.hu) about the detection of an ongoing high profile targeted attack affecting our home country, Hungary. During our investigation of the incident, we discovered a number of C&C servers, and a large number of malware samples that have been used in multiple attacks campaigns in the last couple of years. Indeed, the collected evidences suggest that part of the attack toolkit we discovered was…



    The CrySyS Lab, Budapest has been notified by the Hungarian National Security Authority (www.nbf.hu) about the detection of an ongoing high profile targeted attack affecting our home country, Hungary. During our investigation of the incident, we discovered a number of C&C servers, and a large number of malware samples that have been used in multiple attacks campaigns in the last couple of years. Indeed, the collected evidences suggest that part of the attack toolkit we discovered was used back in 2010. It seems that the main objective of the attackers was information gathering from the infected computers. Many of the victims appear to be ordinary users, but some of the victims are high profile industrial, research, or diplomatic targets, including the case that triggered our investigation. As part of the attackers’ activities is based on misusing the TeamViewer remote access tool, we named the entire malicious toolkit TeamSpy.

    Other creators
    See project
  • Investigations on MiniDuke malware



    Earlier in February 2013, FireEye announced the discovery of a new malware that exploited a 0-day vulnerability in Adobe Reader. Now, we announce another, as yet unknown malware that exploits the same Adobe Reader vulnerability (CVE-2013-0640).
    This new malware was named Miniduke by Kaspersky Labs with whom we carried out its first analysis. Our participation in this research was justified by a detected Hungarian incident. A detailed report on the results of our joint efforts has…



    Earlier in February 2013, FireEye announced the discovery of a new malware that exploited a 0-day vulnerability in Adobe Reader. Now, we announce another, as yet unknown malware that exploits the same Adobe Reader vulnerability (CVE-2013-0640).
    This new malware was named Miniduke by Kaspersky Labs with whom we carried out its first analysis. Our participation in this research was justified by a detected Hungarian incident. A detailed report on the results of our joint efforts has been published by Kaspersky Labs on their Securelist blog site. That report describes what we currently know about the operation of Miniduke including its stages, and also information on the C&C infrastructure and communications. We have published another report from CrySyS Lab that contains information on the indicators of Miniduke infections and gives specific hints on its detection.

    Other creators
    See project
  • The Flame Malware ( sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks)

    In an international collaboration, CrySyS team created a ~60 page detailed technical analysis on the Flame malware and disclosed this information on 28/05/2012, the same time when others also published information on this threat.. Flame was used to steal data in the Middle-East. CrySyS used the name sKyWIper, now mostly called the malware Flame and Flamer.

    Other creators
    See project
  • Duqu: A Stuxnet-like malware found in the wild

    In autumn 2011 CrySyS Lab identified and named the Duqu malware which is related to the famous Stuxnet malware. The team produced the first detailed technical analysis on it.

    Other creators
    See project
  • Click Trajectories

    -

    The ability to monetize customers’ visits from the click of a single link entices companies to take part in spam-based advertising, filling people’s inboxes with billions of messages every day and engendering widespread antipathy. But fear not, this business has also given rise to a multi-billion dollar anti-spam industry. To combat the growth of spam-based advertising, UC Berkeley and UC San Diego computer scientists have presented a holistic analysis of the spam value chain in “Click…

    The ability to monetize customers’ visits from the click of a single link entices companies to take part in spam-based advertising, filling people’s inboxes with billions of messages every day and engendering widespread antipathy. But fear not, this business has also given rise to a multi-billion dollar anti-spam industry. To combat the growth of spam-based advertising, UC Berkeley and UC San Diego computer scientists have presented a holistic analysis of the spam value chain in “Click Trajectories: End-to-End Analysis of the Spam Value Chain”. Their findings offer evidence that there may be a truly effective intervention through public policy action in Western countries.

    Other creators

Organizations

  • ISACA

    Academic Advocate

    -

    - organizing ISACA-BME relations - responsible for courses in IT security management

Recommendations received

More activity by Mark

View Mark’s full profile

  • See who you know in common
  • Get introduced
  • Contact Mark directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses