Michael Flossman

Security Research Services Tech Lead




Michael is a security analyst at Lookout where he works on reverse engineering sophisticated mobile threats while tracking their evolution, the campaigns they are used in, and the actors behind them. He has hands-on experience in vulnerability research, incident response, security assessments, pen-testing, reverse engineering and the prototyping of automated analysis solutions. When not analysing malware there’s a good chance he’s off snowboarding, diving, or looking for flaws in popular mobile apps.

Michael Flossman's posts


| Executives
August 10, 2017
Must read for enterprises sending employees abroad: The SonicSpy malware family

Today, Lookout released information about a new spyware family called SonicSpy. Lookout Security Intelligence researchers discovered the spyware in...

Read Morearrow_forward



| Researchers
August 10, 2017
SonicSpy: Over a thousand spyware apps discovered, some in Google Play

Lookout researchers have identified over a thousand spyware apps related to a threat actor likely based in Iraq. Belonging to the family "SonicSpy,"...

Read Morearrow_forward



| Researchers
February 16, 2017
ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar

Using data collected from the Lookout global sensor network, the Lookout research team was able to gain unique visibility into the ViperRAT malware, including 11 new, unreported applications.

Read Morearrow_forward



| Researchers
September 16, 2016
Four spyware apps removed from Google Play

Through close collaboration with an enterprise customer, Lookout identified Overseer, a piece of spyware we found in four apps live on the Google Play store.The malware was also injected as a trojan in Russian and European News applications for...

Read Morearrow_forward