Michael Flossman

Security Research Services Tech Lead




Michael is a security analyst at Lookout where he works on reverse engineering sophisticated mobile threats while tracking their evolution, the campaigns they are used in, and the actors behind them. He has hands-on experience in vulnerability research, incident response, security assessments, pen-testing, reverse engineering and the prototyping of automated analysis solutions. When not analysing malware there’s a good chance he’s off snowboarding, diving, or looking for flaws in popular mobile apps.

Michael Flossman's posts


| Researchers
May 15, 2018
Stealth Mango and Tangelo: Nation state mobile surveillanceware stealing data from military & government officials

Lookout Security Intelligence has discovered Android and iOS surveillanceware tools targeting government officials, diplomats, military personnel,...

Read Morearrow_forward



| Researchers
April 16, 2018
Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East

Lookout researchers have identified a new, highly targeted surveillanceware family known as Desert Scorpion in the Google Play Store.

Read Morearrow_forward



| Researchers
April 16, 2018
mAPT ViperRAT Found in Google Play

Lookout researchers discovered samples belonging to the ViperRAT malware family, a known mobile advanced persistent threat (mAPT), in the Google Play Store.

Read Morearrow_forward



| Researchers
February 26, 2018
5-year-old banking trojan and malware-as-a-service operation booms with new activity

BancaMarStealer, also known as Marcher, is a malware family designed to phish a victim's banking (or other service) credentials. It was first spotted...

Read Morearrow_forward



| Researchers
January 10, 2018
Mobile APT (mAPT) SpyWaller re-emerges, may include Western targets

Lookout has discovered new variants of the SpyWaller surveillanceware with advanced espionage capabilities. The variants now target Facebook...

Read Morearrow_forward



| Researchers
November 16, 2017
Tropic Trooper goes mobile with Titan surveillanceware

Learn about Titan, a family of sophisticated Android surveillanceware apps surfaced by Lookout's automated analysis that, based on command and control infrastructure, is linked to the same actors behind Operation Tropic Trooper.

Read Morearrow_forward



| Researchers
October 20, 2017
JadeRAT mobile surveillanceware spikes in espionage activity

Lookout researchers are monitoring the evolution of an Android surveillanceware family known as JadeRAT, we believe may be connected to a government...

Read Morearrow_forward



| Researchers
October 5, 2017
FrozenCell: Multi-platform surveillance campaign against Palestinians

Lookout researchers have discovered a new mobile surveillanceware family, FrozenCell. The threat is likely targeting employees of various Palestinian...

Read Morearrow_forward



| Researchers
August 31, 2017
Lookout discovers sophisticated xRAT malware tied to 2014 “Xsser / mRAT” surveillance campaign against Hong Kong protesters

Lookout researchers have identified a mobile trojan called xRAT with extensive data collection functionality and the ability to remotely run a...

Read Morearrow_forward



| Executives
August 10, 2017
Must read for enterprises sending employees abroad: The SonicSpy malware family

Today, Lookout released information about a new spyware family called SonicSpy. Lookout Security Intelligence researchers discovered the spyware in...

Read Morearrow_forward