Press

Media Inquiries: antoinette@comae.io


  • May 19, 2017 | ThreatPost

    Available Tools Making Dent In WannaCry Encryption

    Suiche stresses that victims should not reboot their infected machines if they haven't already. Suiche, who did a breakdown of the crypto implementation of WannaCry during a webinar with Kaspersky Lab this week, said today that the killswitch domain he registered is still recording infection attempts, including a spike of almost 5,000 last night from Malaysia.

    Read More
  • May 19, 2017 | Reuters

    French researchers find way to unlock WannaCry without ransom

    Suiche published a blog with technical details summarizing what the group of passing online acquaintances (goo.gl/iIFDZs) has built and is racing to share with technical staff at organizations infected by WannaCry.

    Read More
  • May 19, 2017 | Forbes

    This Tool Could Save You From Paying WannaCry Ransomware Crooks

    "This tool isn't perfect, but if companies don't have back up this is their only hope," said Suiche.

    Read More
  • May 18, 2017 | Wired

    A WannaCry Flaw Could Help Some Victims Get Files Back

    Within 24 hours, another pair of French researchers, Benjamin Delpy and Matt Suiche, say they've now adapted the tool to work on Windows 7, too.

    Read More
  • May 17, 2017 | Bloomberg

    Cyber-Crime Defense Built in the U.A.E (Video)

    Comae Technologies Founder Matt Suiche discusses the global risks of malware attacks. He speaks on "Bloomberg Markets: Middle East." (Source: Bloomberg)

    Read More
  • May 17, 2017 | LA Times

    It almost makes you WannaCry: The search for the hackers who infected computers around the world

    It's something we started to see more and often in the past few years," said Matt Suiche, founder of the Dubai-based Comae Technologies, who played a key role in unearthing a vital clue in the WannaCry mystery. "What we see is that security needs to be a joint effort. Open source collaboration and cooperation are very important to help us work together on these issues."

    Read More
  • May 16, 2017 | Business Insider

    North Korean hackers might be behind the global WannaCry ransomware attack

    Another researcher, Comae Technologies' Matthieu Suiche, corroborated the findings. That suggests Lazarus borrowed code for WannaCry from its own, existing tools.

    Read More
  • May 16, 2017 | Motherboard

    Snippet of WannaCry Ransomware Linked to Suspected North Korean Malware

    Matthieu Suiche, founder of cybersecurity company Comae Technologies, also highlighted apparent similarities.

    Read More
  • May 16, 2017 | RT

    WannaCry ransomware shares code with North Korea-linked malware - researchers

    "WannaCry and this [program] attributed to Lazarus are sharing code that's unique. This group might be behind WannaCry also," Suiche said, as cited by Wired.

    Read More
  • May 16, 2017 | Daily Mail

    Group linked to NSA spy leaks threatens sale of new tech secrets

    "ShadowBrokers are back" tweeted Matthieu Suiche, a French hacker and founder of the United Arab Emirates-based cyber security firm Comae Technologies, who has studied the Shadow Broker releases and believes the group has access to NSA files

    Read More
  • May 16, 2017 | Huffpost UK

    Cyber-Security Experts Fear the Progression Of ΓÇÿWannaCry' Ransomware

    "We are in the second wave," said Matthieu Suiche of Comae Technologies. "As expected, the attackers have released new variants of the malware. We can surely expect more."

    Read More
  • May 16, 2017 | Reuters

    Group linked to NSA spy leaks threatens sale of new tech secrets

    ShadowBrokers are back" tweeted Matthieu Suiche, a French hacker and founder of the United Arab Emirates-based cyber security firm Comae Technologies, who has studied the Shadow Broker releases and believes the group has access to NSA files.

    Read More
  • May 16, 2017 | LA Times

    Security officials say worst effect of global cyber attack subsiding, but remain on edge about new attacks

    Matt Suiche, chief executive officer and co-founder of a security startup based in Dubai, also registered a site to blunt the second attack.

    Read More
  • May 15, 2017 | WashingtonPost

    New Wave of Ransom Threats Seen in Unprecedented Attack (1)

    Matt Suiche, founder of United Arab Emirates-based cyber security firm Comae Technologies, said he's seen a variant on the original malware that still contains a kill-switch mechanism -- though future versions could find a way to overcome it. "We are lucky that this logic bug is still present," Suiche said

    Read More
  • May 15, 2017 | Forbes

    "I Don't Want Fame": The Depressing Weekend Of The Guy Who Killed That WannaCry Ransomware

    Matthieu Suiche, founder of security firm Comae Technologies, has been doing similar work in registering domains used by new variants and shutting them down. "I don't care about that... if he's Madonna or not," Suiche said. "Tell them to harass me, I want more followers than The Grugq [a well-known security expert with a large Twitter following]."

    Read More
  • May 15, 2017 | Zerohedge

    New Variant Of "WannaCry" Virus Emerges Infecting 3,600 Computers Per Hour

    As Bloomberg reports that Matt Suiche, founder of United Arab Emirates-based cyber security firm Comae Technologies warns a new version of the ransomware may have also been spreading over the weekend.

    Read More
  • May 15, 2017 | The Guardian

    WannaCry ransomware has links to North Korea, cybersecurity experts say

    and echoed by other researchers including Matthieu Suiche from UAE-based Comae Technologies.

    Read More
  • May 15, 2017 | Wired

    The WannaCry Ransomware Has a Link to Suspected North Korean Hackers

    But Suiche sees the Contopee link as a strong clue about WannaCry's origins. The Dubai-based researcher has closely followed the WannaCry malware epidemic since Friday, and over the weekend he identified a new "kill switch" in an adapted version of the code, a web domain the WannaCry ransomware checks to determine whether it will encrypt a victim's machine. Just before Mehta's finding, he identified a new URL"this time, one that begins with the characters "ayylmao."That LMAO string, in Suiche's view, is no coincidence. "This one looks like an actual provocation to the law-enforcement and security community," Suiche says. "I believe that's North Korea actually trolling everyone now."

    Read More
  • May 15, 2017 | Softpedia

    North Korean Hackers from Lazarus May Be Behind WannaCry Ransomware Attack

    Other security researchers other than the Mehta have noticed the same similarity, such as Comae Technologies' Matthieu Suiche, who also discovered and killed a new variant by activating the kill switch.

    Read More
  • May 15, 2017 | Forbes

    Who's Behind The Ransomware Pandemic? One Small Clue Points To North Korea

    Darien Huss and founder of Comae Technologies Matthieu Suiche. All have been actively investigating and defending the web against WannaCry and were intrigued at the possible link to North Korea.

    Read More
  • May 15, 2017 | Wall St Journal

    Researchers Identify Clue Connecting Ransomware Assault to Group Tied to North Korea

    Representatives from three major cybersecurity firms: Symantec Corp. SYMC 3.19% , Kaspersky Lab ZAO and Comae Technologies later on Monday said they found the same the link.

    Read More
  • May 15, 2017 | Business Mirror

    Cyber-attack aftershock feared; US warns of complexity

    Suiche of Comae Technologies said he had done the same for one of the new variants of malware to surface since the initial wave.

    Read More
  • May 15, 2017 | Cyberscoop

    Researchers: WannaCry ransomware shares code with North Korean malware

    "From a technical point of view those two functions and their references are identical," said Matt Suiche, founder of United Arab Emirates-based cybersecurity firm Comae Technologies.

    Read More
  • May 15, 2017 | US Today

    Ransomware hack linked to North Korea, researchers say

    Security researcher Matthieu Suiche, of Comae Technologies in the United Arab Emirates, said the hackers may be sending a message in some of the code that's showing up, suggesting their purpose is to stir political mayhem.

    Read More
  • May 15, 2017 | The Atlantic

    Was North Korea Behind Last Week's Global Cyberattack?

    Matt Suiche, a Dubai-based security researcher, told Wired it "would be a lot of trouble" for hackers "to write ransomware, target everyone in the world, and then make a fake attribution to North Korea."

    Read More
  • May 15, 2017 | Bloomberg

    Cyberattack Is Blunted as Governments, Companies Gain Upper Hand

    Matt Suiche, founder of United Arab Emirates-based cyber security firm Comae Technologies, said around 10,000 machines have been infected by the second variation of the malware.

    Read More
  • May 14, 2017 | New York Times

    Ransomware's Aftershocks Feared as U.S. Warns of Complexity

    Copycat variants of the malicious software behind the attacks have begun to proliferate, according to experts who were on guard for new attacks. "We are in the second wave," said Matthieu Suiche< of Comae Technologies, a cybersecurity company based in the United Arab Emirates. "As expected, the attackers have released new variants of the malware. We can surely expect more."

    Read More
  • May 14, 2017 | Gizmodo

    US Government Fears a Monday Explosion of the Ransomware Plague It Helped Create

    "We are in the second wave," Matthieu Suiche of Comae Technologies, tells the New York Times. "As expected, the attackers have released new variants of the malware. We can surely expect more."

    Read More
  • May 14, 2017 | TechCrunch

    Companies, governments brace for a second round of cyberattacks in WannaCry's wake

    Writing on his blog, Matt Suiche, the founder of Comae Technologies, elaborated on some of the new variants of the ransomware that cybersecurity specialists are finding in the wild.

    Read More
  • May 14, 2017 | Network World

    New WannaCry ransomware variants: Patch old PCs now to avoid becoming a victim

    Fortunately, security researchers @benkow_ spotted the domain and Matthieu Suiche registered the kill switch Sunday. Suiche added:I highly suspect there are multiple variants in the wild with multiple kill switches! #WannaCry Good news is: there are still kill switches!MalwareTech confirmed the "new kill switch" had been transferred to his sinkhole. On Sunday, Suiche warned, "Until people update and upgrade their operating systems, they are still at threat. The fact I registered the new kill-switch is only a temporarily relief which does not resolve the real issue, which is that people are running out-of-support Operating Systems."

    Read More
  • May 13, 2017 | ABCNews

    Researcher 'accidentally' stops spread of 'unprecedented' global cyberattack

    "Currently the spreading of the ransomware is slowed down dramatically because a researcher found a logic bug in the malware, not because the companies around the world are having good security practice," Matt Suiche, founder of Comae Technologies, a cybersecurity company in the United Arab Emirates, told ABC News on Saturday. Suiche said the cyberattackers could soon release a new update to the malware, making it more robust and resuming the global infection."I'd even say this update probably already happened," he added.

    Read More
  • May 13, 2017 | The Hacker News

    WannaCry Kill-Switch(ed)? It's Not Over! WannaCry 2.0 Ransomware Arrives

    Updated: However, Suiche also confirmed that the modified variant with no kill switch is corrupted, but this doesn't mean that other hackers and criminals would not come up with a working one.

    Read More
  • May 13, 2017 | The National UAE

    UAE on high alert over WannaCry attack

    Mr Suiche told The National that "mature" organisations running old operating systems that weren't regularly patched were especially vulnerable

    Read More
  • May 12, 2017 | New York Times

    What We Know and Don't Know About the International Cyberattack

    "The kill switch is why the U.S. hasn't been touched so far," said Matthieu Suiche, founder of Comae Technologies, a cybersecurity company in the United Arab Emirates. "But it's only temporary. All the attackers would have to do is create a variant of the hack with a different domain name."

    Read More
  • May 12, 2017 | New York Times

    Hacking Attack Has Security Experts Scrambling to Contain Fallout

    "The kill switch is why the U.S. hasn't been touched so far," said Matthieu Suiche, founder of Comae Technologies, a cybersecurity company in the United Arab Emirates. "But it's only temporary. All the attackers would have to do is create a variant of the hack with a different domain name. I would expect them to do that."

    Read More
  • 20 April, 2017 | Cyberscoop

    Oracle databases at risk because of a leaked NSA hacking tool, researcher says

    A complex and powerful implant codenamed PASSFREELY that is mentioned in the trove of documents allows for an attacker to bypass the authentication process behind Oracle servers, security researcher Matt Suiche told CyberScoop.

    Read More
  • 18 April, 2017 | NationalJournal

    Snowden 2.0: "The Shadow Brokers" Stalk the NSA

    The Shadow Brokers also released step-by-step evidence outlining the NSA's penetration of secure financial transactions between Middle Eastern banks. Matt Suiche, the founder of cybersecurity firm Comae Technologies, said it's one the clearest pictures ever of both the United States's cyber-capabilities and the global financial system's vulnerabilities.

    Read More
  • 17 April, 2017 | Bank Infosecurity

    Hackers Reveal Apparent NSA

    Of course, the number of attempts to target organizations involved in SWIFT may be much larger. As Suiche asks in a blog post: "How many of those service bureaus may have been or are currently compromised?"

    Read More
  • 17 April, 2017 | ThreatPost

    Shadowbrokers' Windows Zero-Days Already Patched

    Suiche explained these bank transactions are handled on an Oracle database running SWIFT software. The archive includes tools used by the NSA to take data from the Oracle installation, including a list of users and SWIFT message queries, Suiche said.

    Read More
  • 17 April, 2017 | Computerworld

    Microsoft confirms it's patched most of the NSA's Windows exploits

    Some of the exploits allegedly used by the NSA relied on vulnerabilities in older and not-supported SKUs (stock-selling units) of Windows Server, according to Matt Suiche, founder of the security firm Comae Technologies, who named Windows 2003 specifically.

    Read More
  • 17 April, 2017 | ITNews

    Shadow Brokers leak more NSA exploits

    Due to the detailed description of service bureau infrastructure in the Shadow Brokers documents, Suiche believes the leak could be harmful to the SWIFT network.

    Read More
  • 17 April, 2017 | Silicon

    Documents Show NSA Hacked SWIFT Service Provider

    The documents appear to indicate NSA efforts to directly monitor SWIFT providers' activities in order to detect funds transfers by militant or criminal groups, according to security researcher Matt Suiche.

    Read More
  • 17 April, 2017 | DailyMail

    Hackers reveal documents showing what tools the NSA could use to gain access to the global system used to transfer money between banks

    Matt Suiche, founder of cybersecurity firm Comae Technologies, wrote in a blog post that screen shots indicated some SWIFT affiliates were using Windows servers that were vulnerable at the time, in 2013, to the Microsoft exploits published by the Shadow Brokers.

    Read More
  • 17 April, 2017 | CBSNews

    New leak suggests NSA penetrated banking networks in Middle East

    "This is by far the most brutal dump," said Comae Technologies founder Matt Suiche, who has closely followed the group's disclosures and initially helped confirm its connection to the NSA last year.

    Read More
  • 16 April, 2017 | Reuters

    Hacker documents show NSA tools for breaching global money transfer system

    Matt Suiche, founder of cybersecurity firm Comae Technologies, wrote in a blog post that screen shots indicated some SWIFT affiliates were using Windows servers that were vulnerable at the time, in 2013, to the Microsoft exploits published by the Shadow Brokers. He said he concluded that the NSA took advantage and got in that way.

    Read More
  • 16 April, 2017 | BBC

    US government 'monitored bank transfers'

    "If you hack the service bureau, it means that you also have access to all of their clients, all of the banks," said Matt Suiche, founder of the United Arab Emirates-based cybersecurity firm Comae Technologies, speaking to Reuters.

    Read More
  • 16 April, 2017 | The Sydney Morning Herald

    Wrecking the internet': hackers may have just revealed huge flaw in global commodity market

    "If you hack the service bureau, it means that you also have access to all of their clients, all of the banks," said Matt Suiche, founder of the United Arab Emirates-based cybersecurity firm Comae Technologies, who has studied the Shadow Broker releases and believes the group has access to NSA files.

    Read More
  • 16 April, 2017 | IBTimes

    Hackers reveal documents showing NSA breached SWIFT money transferring system

    "As soon as they bypass the firewalls, they target the machines using Microsoft exploits," Suiche told Reuters. "We now have all of the tools the NSA used to compromise SWIFT (via) Cisco firewalls, Windows," he added

    Read More
  • 16 April, 2017 | Reuters

    Hacker documents show NSA tools for breaching global money transfer system

    Matt Suiche, founder of cybersecurity firm Comae Technologies, wrote in a blog post that screen shots indicated some SWIFT affiliates were using Windows servers that were vulnerable at the time, in 2013, to the Microsoft exploits published by the Shadow Brokers. He said he concluded that the NSA took advantage and got in that way.

    Read More
  • 15 April, 2017 | Techworld

    New NSA leak may expose its bank spying, Windows exploits

    If the files are real, the exposed information represents a threat to the SWIFT network, said Matt Suiche, founder of security firm Comae Technologies, who has been looking over the leaked files.

    Read More
  • 15 April, 2017 | WashingtonExaminer

    Microsoft: NSA leak vulnerabilities already patched in modern products

    Snowden mentioned that Microsoft "needs to take real action" in response to the leak, to which computer security researcher Matt Suiche, founder of UAE-based Comae Technologies, suggested that Microsoft may have been tipped off by "someone."

    Read More
  • 15 April, 2017 | HackRead

    New Leak from Shadow Brokers Show NSA targeted Windows and Banks

    Founder of Comae technologies, Mr. Matt Suiche, told media: "If you hack the service bureau, it means that you also have access to all of their clients, all of the banks,"

    Read More
  • 15 April, 2017 | Forbes

    Shadow Brokers Leak Reveals The NSA's Deep Access Into SWIFT Banking Network

    Matt Suiche, founder of the cybersecurity firm Comae Technologies, notes that one particular SWIFT bureau was targeted

    Read More
  • 14 April, 2017 | RedmondMag

    Older Windows Systems Targeted by Newly Released Hack Tools

    The swift folder contains PowerPoint slides suggesting that the Middle East network used by the Society for Worldwide Interbank Financial Telecommunication (SWIFT) for financial transactions was targeted by the NSA, according to a blog post by Microsoft Most Valuable Professional Matt Suiche.

    Read More
  • 14 April, 2017 | RussiaToday

    Hackers expose NSA financial spying arsenal, global banking system potentially at risk

    IP addresses listed alongside the institutions do not correspond to machines at the institutions, according to security researcher Matt Suiche.

    Read More
  • 14 April, 2017 | Cyberscoop

    Shadow Brokers leak NSA documents that may reveal operation aimed at Middle Eastern banks

    "It shows that they have a lot more than what we originally thought," said security researcher Matt Suiche, "the Shadow Brokers previously claimed this all came from a compromised NSA attack/staging server … you wouldn't host presentation slid

    Read More
  • 14 April, 2017 | ThreatPost

    ShadowBrokers Expose NSA Access To SWIFT Service Bureaus

    "In this case, if Shadow Brokers claims are indeed verified, it seems that the NSA sought to totally capture the backbone of international financial system to have a God's eye into a SWIFT Service Bureau ' and potentially the entire SWIFT network," said researcher Matt Suiche in a blog posted today explaining his analysis of the data dump.

    Read More
  • 14 April, 2017 | Techtarget

    Shadow Brokers release SWIFT banking and Windows exploits

    Matt Suiche, Microsoft MVP and founder of Comae Technologies, based in the United Arab Emirates, wrote on Medium this release details evidence "of the largest infection of a SWIFT Service Bureau to date."

    Read More
  • 14 April, 2017 | WIRED

    Major Leak Suggests NSA was deep in Middle East Banking System

    "This is the equivalent of hacking all the banks in the region without having to hack them individually," says Suiche, founder of UAE-based incident response and forensics startup Comae Technologies. "You have access to all their transactions."

    Read More
  • 14 April, 2017 | BoingBoing

    The latest NSA dump from the Shadow Brokers tells you how to break into banks

    "This would make a lot of sense that the NSA compromise this specific SWIFT Service Bureau for Anti-money laundering (AML) reasons in order to retrieve ties with terrorists groups," Suiche wrote.

    Read More
  • 14 April, 2017 | WashingtonExaminer

    Edward Snowden: Latest NSA leak is 'not a drill'

    Computer security researcher Matt Suiche, founder of UAE-based Comae Technologies, who helped confirm that prior NSA leaks from the Shadow Brokers are real, has been updating a blog post on Friday's document dump. "This is by far, the most interesting release from Shadow Brokers as it does not only contain tools," he wrote.

    Read More
  • 14 April, 2017 | BelfastTelegraph

    New leak suggests NSA penetrated banking networks in Middle East

    Comae Technologies founder Matt Suiche, who has closely followed the disclosures, said the latest release was unusual because it explicitly identified alleged NSA targets.

    Read More
  • 14 April, 2017 | FCW

    Shadow Brokers leak trove of NSA hacking tools

    That may be true as far as Microsoft products still under support, noted hacker Matt Suiche noted in a blog post. But some of the exploits target Windows XP, which has been out of support since 2014, and Windows Vista, which went out of support on April 11.

    Read More
  • 14 April, 2017 | Engadget

    Shadow Brokers release also suggests NSA spied on bank transactions

    Reuters reports that SWIFT also claims there's no evidence its network has been accessed. Meanwhile, Matt Suiche looked through the documents and writes about what they show,

    Read More
  • 14 April, 2017 | IBTimes

    NSA May Have Hacked Global Banks, Shadow Brokers Release Indicates

    "This is the equivalent of hacking all the banks in the region without having to hack them individually, Matt Suiche, founder of UAE-based incident response and forensics startup Comae Technologies, told Wired. "You have access to all their transactions."

    Read More
  • 14 April, 2017 | ITWorld

    New NSA leak may expose its bank spying, Windows exploits

    If the files are real, the exposed information represents a threat to the SWIFT network, said Matt Suiche, founder of security firm Comae Technologies, who has been looking over the leaked files.

    Read More
  • 14 April, 2017 | HousingWire

    Did the NSA spy on Middle East banks using the SWIFT network?

    "This is the equivalent of hacking all the banks in the region without having to hack them individually," says Suiche, founder of UAE-based incident response and forensics startup Comae Technologies.

    Read More
  • 14 April, 2017 | Reuters

    Hackers release files indicating NSA monitored global bank transfers

    "If you hack the service bureau, it means that you also have access to all of their clients, all of the banks," said Matt Suiche, founder of the United Arab Emirates-based cybersecurity firm Comae Technologies, who has studied the Shadow Broker releases and believes the group has access to NSA files.

    Read More
  • 14 April, 2017 | APNews

    New leak suggests NSA penetrated Mideast banking networks

    "This is by far the most brutal dump," said Comae Technologies founder Matt Suiche, who has closely followed the group's disclosures and initially helped confirm its connection to the NSA last year.

    Read More
  • 14 April, 2017 | TechTarget

    Shadow Brokers release SWIFT banking and Windows exploits

    Matt Suiche, Microsoft MVP and founder of Comae Technologies, based in the United Arab Emirates, wrote on Medium this release details evidence "of the largest infection of a SWIFT Service Bureau to date."

    Read More
  • 14 April, 2017 | WallStJournal

    Hacker Group Says U.S. Tried to Breach Money-Transfer System

    Matt Suiche, founder of Comae Technologies FZE, a company that investigates computer intrusions, said the documents include Excel files supposedly containing employee login credentials as well as information allegedly about customers, and that the Windows attack tools appear to work as indicated.

    Read More
  • 14 April, 2017 | ArsTechnica

    NSA-leaking Shadow Brokers just dumped its most damaging release yet

    Friday's dump also contains code for hacking into banks, particularly those in the Middle East. According to this analysis by Matt Suiche, a researcher and founder of Comae Technologies, Jeepflea_Market is the code name for a 2013 missio

    Read More
  • 14 April, 2017 | SuedDeutsche

    Mysteriöse Gruppe offenbart mutmaßliche Hacking-Angriffe der NSA

    Außerdem wussten die Hacker anscheinend Bescheid, wie die interne Infrastruktur dieses Anbieters beschaffen war, wie der IT-Sicherheitsforscher Matt Suiche in einem Blogpost schreibt. Über eigens geschriebene Programme konnten die Hacker gezielt nach Swift-Zahlungen suchen. Alles in allem hätten die Angreifer "volle Kontrolle", oder, wie Suiche auf Nachfrage sagt: God's eye; das Auge Gottes, das alles sieht.

    Read More
  • 14 April, 2017 | HackerNews

    Latest Hacking Tools Leak Indicates NSA Was Targeting SWIFT Banking Network

    "A SWIFT Service Bureau is the kind of the equivalent of the Cloud for Banks when it comes to their SWIFT transactions and messages; the banks' transactions are hosted and managed by the SWIFT Service Bureau via an Oracle Database and the SWIFT Softwares," security researcher Matt Suiche explains in a blog post.

    Read More
  • 14 April, 2017 | TheHill

    NSA may have hacked banking transactions network

    "This is by far, the most interesting release from Shadow Brokers as it does not only contains tools," researcher Matt Suiche, founder of UAE-based cyber security firm Comae and the Dubai cybersecurity conference OPCDE, wrote in a Medium post.

    Read More
  • 15 March, 2017 | Bloomberg

    Hacked Twitter Accounts Post Swastikas, Pro-Erdogan Content

    “Attackers always look for the weakest link of the chain,” said Matt Suiche, founder of United Arab Emirates-based cyber-security startup Comae Technologies. “Third party platforms are perfect targets. It makes lots of sense.”

    Read More
  • 3 March, 2017 | Los Angeles Times

    CIA's apparent hacking techniques revealed in data breach

    The data confirm the CIA maintains “an extensive database of cyberweapons,” said Matt Suiche, a well-known hacker who founded cybersecurity start-up Comae Technologies. “It also shows they are buying from third parties, and that they are closely following every advancement” in cybersecurity.

    Read More
  • 3 March, 2017 | WIRED

    How the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks)

    A tool called TinyShell appears to allow the CIA hackers full remote control of an infected television, including the ability to run code and offload files, says Matt Suiche, a security researcher and founder of the UAE-based security firm Comae Technologies. “I would assume that, by now, they would definitely have exploits for Samsung TVs,” Suiche says. “This shows that they’re interested. If you’re doing the research, you’re going to find vulnerabilities.” Samsung did not respond to WIRED’s request for comment.

    Read More
  • Feb 16, 2017 | International Business Times

    Fancy Bear: Leaked Google report shows how much the tech giant knows about Russian hackers

    "It looks like Google researchers were well aware of Sofacy before it was publicly disclosed," Matt Suiche, security researcher and the founder of Comae Technologies told Motherboard, after reviewing the report. "And also attributed Sofacy and X-Agent to Russia before it was publicly done by FireEye, ESET or CrowdStrike."

    Read More
  • Feb 16, 2017 | SecurityLab

    Google следит за деятельностью «русских» хакеров

    «По всей видимости, исследователям Google было хорошо известно о Sofacy до того, как информация стала публичной, - отметил специалист Comae Technologies Мэтт Суиче (Matt Suiche) в интервью Motherboard. - Они также приписали Sofacy и X-Agent России до того, как это сделали FireEye, ESET или CrowdStrike».

    Read More
  • Feb 15, 2017 | VICE's Motherboard

    A Glimpse Into How Much Google Knows About Russian Government Hackers

    "It looks like Google researchers were well aware of Sofacy before it was publicly disclosed," Matt Suiche, a security researcher and the founder of Comae Technologies and the OPCDE conference, told Motherboard in an online chat after reviewing the report.

    Read More
  • Jan 12, 2017 | Cyberscoop

    Shadow Brokers leak NSA-linked Microsoft hacking tools

    “This dump contains Windows Implants and not Unix tools, reinforcing the insider theory. And the outdated Windows target of those implants reinforce the opinion that Shadow Brokers only has old dirt,” said Matt Suiche, founder of United Arab Emirates-based cybersecurity startup Comae Technologies. “There is no reason to have all the tools of every platforms etc. on a staged server.”

    Read More
  • Dec 29, 2016 | Forbes

    Dubai Has $300 Million To Entice The World's Best Startups To Its Accelerator

    Comae Technologies, which wants to use artificial intelligence to solve crimes. After team members worked in Dubai, 14 of the startups are relocated to the city, according to the Foundation.

    Read More
  • Nov 1, 2016 | HackRead

    Shadow Brokers Dump List of Servers Hacked by the NSA’s Equation Group

    A UAE-based security startup Comae’s researcher Matt Suiche discovered while inspecting the links that around 331 IP addresses were compromised through the spy tools pair known as Intonation and PitchImpair. According to Suiche, currently there is not a great deal of information available but most of the folders contain some configuration variables and metadata but there isn’t any “source code this time.”

    Read More
  • Oct 26, 2016 | Dubai Media Office

    Five of the 30 Teams Taking Part in the Inaugural Program of the Dubai Future Accelerators

    One example of the successful entries is Comae Technology, a UAE-based Cyber Security start up specialized on memory forensics for both digital forensics and incident response to cyber incidents purposes. According to US tech giant and cybersecurity specialists Symantec, the number of zero-day vulnerabilities (a hole in software that is unknown to the vendor) discovered in 2015 more than doubled to 54 – a 125 percent increase from 2014. This makes start-ups such as Comae not only relevant but necessary for cities and governments in the 21st century.

    Read More
  • Aug 19, 2016 | The Intercept

    The NSA Leak Is Real, Snowden Documents Confirm

    After viewing the code, Green told The Intercept the MSGID string’s occurrence in both an NSA training document and this week’s leak is “unlikely to be a coincidence.” Computer security researcher Matt Suiche, founder of UAE-based cybersecurity startup Comae Technologies, who has been particularly vocal in his analysis of the ShadowBrokers this week, told The Intercept “there is no way” the MSGID string’s appearance in both places is a coincidence.

    Read More
  • Aug 18, 2016 | Politico

    Privacy hawks pounce on NSA hack

    “An insider could have stolen them directly from the NSA, in a similar fashion to how [Snowden] stole an untold number of the spy agency’s top secret documents. And this theory is being pushed by someone who claims to be, himself, a former NSA insider.” Security researcher and hacker Matt Suiche also explored the same theory with another anonymous ex-NSA analyst.

    Read More
  • Aug 18, 2016 | BusinessInsider

    Experts have 2 theories for how top-secret NSA data was stolen, and they’re equally disturbing

    His remarks about looking at the files are interesting, especially in light of a post on Medium by Matt Suiche, the founder of Comae Technologies. He claimed that he was contacted by a former NSA analyst who offered a somewhat-redacted image of an award citation received while working inside the agency for the US Army to prove his bona fides.

    Read More
  • Aug 18, 2016 | RussiaToday

    Leak in-house? NSA data dump could be work of insider

    However, Matt Suiche, the CEO of a Dubai-based cybersecurity company, wrote that the problem with this theory is that the NSA exposed the hacking tools on a server. “Making a mistake is not impossible,” for the Tailored Access Operation (TAO) – the NSA’s hacking team, Suiche noted.

    Read More
  • Aug 18, 2016 | Mubasher24

    أخطر أدوات التجسس للبيع: كيف تم اختراق وكالة الأمن القومي الأمريكية؟

    هذا وقد أكد العديد من الخبراء في مجال الأمن المعلوماتي وعلى رأسهم مؤسس شركة “Comae Technologies” لحماية الإنترنت مات سويتش أن رمز الحاسوب المسرب يشير أنه من أدوات “NSA“.

    Read More
  • Aug 17, 2016 | McClatchyDC

    Evidence mounts that NSA computer code was stolen

    “The (Tailored Access Operations) Team had severe concerns about how easy it was to just walk out with the data on a USB drive,” Matt Suiche, a French hacker, wrote Wednesday in a blog posting.

    Read More
  • Aug 17, 2016 | Reuters

    'Auction' of NSA tools sends security companies scrambling.

    Comae Technologies founder Matt Suiche said the theory of a disgruntled insider couldn't be ruled out. In a blog post , Suiche said he'd been contacted by a former NSA analyst who pointed out that the tools leaked online normally resided on a segregated network and that the way they were named suggests the data was copied direct from the source. Suiche cautioned it was just a theory.

    Read More
  • Aug 17, 2016 | NPR

    'Shadow Brokers' Claim To Have Hacked The NSA's Hackers.

    Matt Suiche, a security researcher who analyzed the code that has been publicly released by the Shadow Brokers, tells NPR's Aarti Shahani that it does appear to be a compilation of tools used by the NSA.

    Read More
  • Aug 17, 2016 | VICE

    The Current Highest Bid for Alleged NSA Data is 999,998.371 Bitcoin Short

    Matt Suiche, the CEO of UAE-based cybersecurity company Comae, who's been following the leak since the beginning, is skeptical.

    Read More
  • Aug 16, 2016 | Guardian

    Hacking group auctions 'cyber weapons' stolen from NSA

    “Given the timeframe (Post-DNC hack), this could possibly be orchestrated by the Russian government so America will be stuck with Donald Trump as a President,” said Matt Suiche in a Medium post.

    Read More
  • Aug 16, 2016 | AssociatedPress

    Snowden: Exposure of alleged NSA tools may be warning to US

    Matt Suiche, the founder of United Arab Emirates-based cybersecurity startup Comae Technologies, said he and others looking through the data were convinced it came from the NSA. "There's zero debate so far," he said in a telephone interview.

    Read More
  • Aug 16, 2016 | Fortune

    Hackers Have Allegedly Stolen NSA-Linked ‘Cyber Weapons’ and Are Auctioning Them Off

    Although the alleged breach could just be an extravagant hoax, experts who reviewed a preliminary data dump teased alongside the hackers' garbled sales pitch said that the files, amazingly, looked authentic. "This appears to be legitimate code," Matt Suiche, a French cybersecurity entrepreneur, wrote in a Medium blog post, echoing what others had posted on Twitter (TWTR).

    Read More
  • Aug 16, 2016 | VICE

    Email Provider Linked to Alleged NSA Dumps: We Can't Help

    One of those researchers was Matt Suiche, the CEO of UAE-based cybersecurity company Comae. In his analysis, he used the Github API to find an email address linked to one of the accounts that published the data. If law enforcement were to dig into this case, then that email account is likely of interest to investigators: perhaps they could find out more about the user's identity, or their location.

    Read More
  • Aug 16, 2016 | Russia Today

    Hacking group offers ‘stolen NSA cyber-weapons’ in bitcoin auction

    "The data appears to be relatively old; some of the programs have already been known for years," and are unlikely "to cause any significant operational damage," researcher Claudio Guarnieri told Reuters. Meanwhile, Matt Suiche, founder of UAE-based security startup Comae Technologies, concluded the tools looked like they "could be used."

    Read More
  • Aug 16, 2016 | International Business Times

    Hackers claim to have breached NSA's elite cyber-spy team, auction stolen cyberweapons

    "The code in the dump seems legitimate, especially the Cisco exploits ... and those exploits were not public before," Matt Suiche, founder of UAE-based cybersecurity start-up Comae Technologies, told Forbes. "The content seems legit." Suiche, who detailed the products affected in a post on Medium, also said that the connection to the Equation Group, however, could have been faked.

    Read More
  • Aug 16, 2016 | WIRED

    Hackers claim to auction data they stole from NSA-linked spies

    Among the sample files released by the group are exploits that target equipment sold by companies including Cisco, Juniper, Fortigate and Topsec, a Chinese network security firm, according to Matt Suiche, founder of UAE-based incident response and forensics startup Comae Technologies.

    Read More
  • Aug 16, 2016 | The Hill

    Hackers claim to auction NSA source code

    “The code in the dump seems legitimate, especially the Cisco exploits (Most of the dump contains Firewall exploits), and those exploits were not public before,” said Matt Suiche, via electronic chat. Suiche is the founder of United Arab Emirates-based cybersecurity start-up Comae Technologies and has been actively analyzing the source code portions released as proof.

    Read More
  • Aug 15, 2016 | CIO/IDG

    NSA hacked? Top cyber weapons allegedly go up for auction

    The exploits specifically target firewall technology from Cisco, Juniper, Fortinet, and Chinese provider Topsec, said Matt Suiche, CEO of cyber security startup Comae Technologies, in a blog post.

    Read More
  • Aug 15, 2016 | HackerNews

    NSA’s Hacking Group Hacked. Private Tools Leaked

    "I haven't tested the exploits, but they definitely look like legitimate exploits," Matt Suiche, founder of UAE-based cyber security firm Comae Technologies, told the Daily Dot.

    Read More
  • Aug 15, 2016 | Reuters

    Hacking group claims to offer cyber-weapons in online auction

    Still, they appeared to be genuine tools that might work if flaws have not been addressed. After examining the code released Monday, Matt Suiche, founder of UAE-based security startup Comae Technologies, concluded they looked like "could be used."

    Read More
  • Aug 15, 2016 | ComputerWorld

    NSA hacked? Top cyber weapons allegedly go up for auction

    The exploits specifically target firewall technology from Cisco, Juniper, Fortinet and Chinese provider Topsec, said Matt Suiche, CEO of cybersecurity startup Comae Technologies, in a blog post.

    Read More
  • Aug 15, 2016 | Business Insider

    'Shadow Brokers' claim to have hacked an NSA-linked elite computer security unit

    Matt Suiche, CEO of cybersecurity startup Comae Technologies, has also been looking through the sample files since their publication. "I haven't tested the exploits but they def look like legitimate exploits, using third party libraries like scapy etc - at least for the Cisco ASA we can also see several shellcodes," he said.

    Read More
  • Aug 15, 2016 | DailyDot

    Hackers claim to be selling NSA cyberweapons in online auction

    "I haven't tested the exploits, but they definitely look like legitimate exploits," Matt Suiche, founder of UAE-based cybersecurity startup Comae Technologies, told the Daily Dot.

    Read More
  • Aug 15, 2016 | Arstechnica

    Group claims to hack NSA-tied hackers, posts exploits as proof

    Samples of the stolen files are dated most recently to 2013 and contain implants, exploits, and other tools for controlling routers and firewalls, including those from Cisco Systems, Juniper, Fortigate, and China-based Topsec, according to this analysis from Matt Suiche, cofounder and CEO of security firm Comae Technologies.

    Read More
  • Aug 15, 2016 | Forbes

    NSA Hacked? 'Shadow Brokers' Crew Claims Compromise Of Surveillance Op

    "The code in the dump seems legitimate, especially the Cisco exploits ... and those exploits were not public before," said Matt Suiche, founder of UAE based cybersecurity start-up Comae Technologies. "The content seems legit."

    Read More
  • Aug 15, 2016 | Wall St Journal

    Group Claims to Have U.S. Government Hacking Tools for Sale

    “The more we look at it…it looks more and more like a tool kit from the NSA,” said Matt Suiche, the founder of Comae Technologies FZE, a computer-security startup based in the United Arab Emirates.

    Read More
  • Aug 15, 2016 | CNN

    Hacker claims to be selling stolen NSA spy tools

    "It definitely looks like a toolkit used by the NSA," said Matt Suiche, a French computer researcher who has been reviewing the leaked code.

    Read More