FireEye | xxx | 第 2 页FireEye – 第2页 – xxx
菜单

FireEye

Shining a Light on DARKSIDE Ransomware Operations
Update (May 14): Mandiant has observed multiple actors cite a May 13 announcement that appeared to be shared with DARKSIDE RaaS affiliates by the [...]
Effective On-Demand Cyber Intelligence Training, Anywhere, Any Time
Organizations and security teams are increasingly aimin […]
When It Comes to Security Validation, BAS Is Not Enough
Incomplete testing of security controls could have deva […]
The “Big Four”: Spotlight on China
The third installment of our “Big Four” series on China […]
The UNC2529 Triple Double: A Trifecta Phishing Campaign
In December 2020, Mandiant observed a widespread, global phishing campaign targeting numerous organizations across an array of industries. Mandiant tracks [...]
How To Avoid the Costly Risks of Cloud Misconfigurations
Misconfigurations in cloud services present a significa […]
A New Future for FireEye and Mandiant: Accelerating Opportunities
With today’s announcement of the sale of the FireEye Pr […]
UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat
Mandiant has observed an aggressive financially motivated group, UNC2447, exploiting one SonicWall VPN zero-day vulnerability prior to a patch being [...]
An Inside Look Into How Reddit Fights Cyber Threats
How does Reddit handle malicious or suspicious coordina […]
Bringing Clarity to the Government Cyber Security Challenge With AI-Powered XDR
Government agencies depend on IT to carry out operation […]
Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity
In July 2020, Mandiant Threat Intelligence released a public report detailing an ongoing influence campaign we named “Ghostwriter.” Ghostwriter is a [...]
Tackling Digital Safety for Women
Did you know that women are disproportionately affected […]
Supercharge Your Response to Security Incidents With AWS and FireEye Helix
Every organization has been tasked with prioritizing a […]
Abusing Replication: Stealing AD FS Secrets Over the Network
Organizations are increasingly adopting cloud-based services such as Microsoft 365 to host applications and data. Sophisticated threat actors are catching [...]
Establishing a Zero Trust Architecture for Federal Agencies
Amid the ever-evolving, increasingly sophisticated cybe […]
Unified Threat Detection With Endpoint Security 5.1 and Helix
Security teams are inundated with increasingly sophisti […]
Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
In March 2021, Mandiant Managed Defense identified three zero-day vulnerabilities in SonicWall’s Email Security (ES) product that were being exploited in [...]
APT39: An Iranian Cyber Espionage Group Focused on Personal Information
In December 2018, FireEye identified APT39 as an Iranian cyber espionage group responsible for widespread theft of personal information. We have tracked [...]
Bypassing Network Restrictions Through RDP Tunneling
Remote Desktop Services is a component of Microsoft Windows that is used by various companies for the convenience it offers systems administrators, [...]
Cryptocurrency and Blockchain Networks: Facing New Security Paradigms
On Jan. 22, FireEye participated in a panel focused on cryptocurrencies and blockchain technology during the World Economic Forum. The panel addressed [...]
A Nasty Trick: From Credential Theft Malware to Business Disruption
FireEye is tracking a set of financially-motivated activity referred to as TEMP.MixMaster that involves the interactive deployment of Ryuk ransomware [...]
Global DNS Hijacking Campaign: DNS Record Manipulation at Scale
FireEye’s Mandiant Incident Response and Intelligence teams have identified a wave of DNS hijacking that has affected dozens of domains belonging to [...]
Digging Up the Past: Windows Registry Forensics Revisited
FireEye consultants frequently utilize Windows registry data when performing forensic analysis of computer networks as part of incident response and [...]
OVERRULED: Containing a Potentially Destructive Adversary
FireEye assesses APT33 may be behind a series of intrusions and attempted intrusions within the engineering industry. Public reporting indicates this [...]
What are Deep Neural Networks Learning About Malware?
An increasing number of modern antivirus solutions rely on machine learning (ML) techniques to protect users from malware. While ML-based approaches, like [...]
FLARE Script Series: Automating Objective-C Code Analysis with Emulation
This blog post is the next episode in the FireEye Labs Advanced Reverse Engineering (FLARE) team Script Series. Today, we are sharing a new IDAPython [...]
Obfuscated Command Line Detection Using Machine Learning
This blog post presents a machine learning (ML) approach to solving an emerging security problem: detecting obfuscated Windows command line invocations on [...]
Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign
On November 14, 2018, FireEye detected new targeted phishing activity at more than 20 of our clients across multiple industries.
FLARE VM Update
FLARE VM is the first of its kind reverse engineering and malware analysis distribution on Windows platform. Since its introduction in July 2017, FLARE VM [...]
TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers
In a previous blog post we detailed the TRITON intrusion that impacted industrial control systems (ICS) at a critical infrastructure facility. We now track [...]
ICS Tactical Security Trends: Analysis of the Most Frequent Security Risks Observed in the Field
FireEye iSIGHT Intelligence compiled extensive data from dozens of ICS security health assessment engagements (ICS Healthcheck) performed by Mandiant, [...]
2018 Flare-On Challenge Solutions
We are pleased to announce the conclusion of the fifth annual Flare-On Challenge. The numbers are in and we can safely say that this was by far the most [...]
FLARE Script Series: Reverse Engineering WebAssembly Modules Using the idawasm IDA Pro Plugin
This post continues the FireEye Labs Advanced Reverse Engineering (FLARE) script series. Here, we introduce idawasm, an IDA Pro plugin that provides a [...]
APT38: Details on New North Korean Regime-Backed Threat Group
Today, we are releasing details on the threat group that we believe is responsible for conducting financial crime on behalf of the North Korean regime, [...]
Increased Use of a Delphi Packer to Evade Malware Classification
The concept of "packing" or "crypting" a malicious program is widely popular among threat actors looking to bypass or defeat analysis [...]
Click It Up: Targeting Local Government Payment Portals
FireEye has been tracking a campaign this year targeting web payment portals that involves on-premise installations of Click2Gov. Click2Gov is a web-based, [...]
APT10 Targeting Japanese Corporations Using Updated TTPs
In July 2018, FireEye devices detected and blocked what appears to be APT10 (Menupass) activity targeting the Japanese media sector. APT10 is a Chinese [...]
Fallout Exploit Kit Used in Malvertising Campaign to Deliver GandCrab Ransomware
Towards the end of August 2018, FireEye identified a new exploit kit (EK) that was being served up as part of a malvertising campaign affecting users in [...]
Suspected Iranian Influence Operation Leverages Network of Inauthentic News Sites & Social Media Targeting Audiences in U.S., UK, Latin America, Middle East
FireEye has identified a suspected influence operation that appears to originate from Iran aimed at audiences in the U.S., U.K., Latin America, and the [...]
Announcing the Fifth Annual Flare-On Challenge
The FireEye Labs Advanced Reverse Engineering (FLARE) team’s annual reverse engineering challenge will start at 8:00 p.m. ET on Aug. 24, 2018. This is a [...]
BIOS Boots What? Finding Evil in Boot Code at Scale!
Malware continues to take advantage of a legacy component of modern systems designed in the 1980s. Despite the cyber threat landscape continuing to evolve [...]
On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation
On Aug. 1, 2018, the United States District Attorney’s Office for the Western District of Washington unsealed indictments and announced the arrests of [...]
Microsoft Office Vulnerabilities Used to Distribute FELIXROOT Backdoor in Recent Campaign
In September 2017, FireEye identified the FELIXROOT backdoor as a payload in a campaign targeting Ukrainians and reported it to our intelligence customers. [...]
How the Rise of Cryptocurrencies Is Shaping the Cyber Crime Landscape: The Growth of Miners
Cyber criminals tend to favor cryptocurrencies because they provide a certain level of anonymity and can be easily monetized. This interest has increased [...]
Chinese Espionage Group TEMP.Periscope Targets Cambodia Ahead of July 2018 Elections and Reveals Broad Operations Globally
FireEye has examined a range of TEMP.Periscope activity revealing extensive interest in Cambodia's politics, with active compromises of multiple [...]
Malicious PowerShell Detection via Machine Learning
Cyber security vendors and researchers have reported for years how PowerShell is being used by cyber threat actors to install backdoors, execute malicious [...]
RIG Exploit Kit Delivering Monero Miner Via PROPagate Injection Technique
Through FireEye Dynamic Threat Intelligence (DTI), we observed RIG Exploit Kit (EK) delivering a dropper that leverages the PROPagate injection technique [...]
Bring Your Own Land (BYOL) – A Novel Red Teaming Technique
One of most significant recent developments in sophisticated offensive operations is the use of “Living off the Land” (LotL) techniques by attackers. These [...]

Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51