WMImplant leverages WMI for the command and control channel, the means for executing actions (gathering data, issuing commands, etc.) on the targeted system, and data storage.Read more...
No such category found
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
March 15, 2017 8:48 AM By Zain Gardezi | Advanced Malware
FireEye researchers showcase some of the prominent malvertising campaigns active over the last four months, as well as the cushion servers related to different exploit kits.Read more...
March 14, 2017 8:00 AM By Jurgen Kutscher | Threat Intelligence
FireEye releases M-Trends 2017 with the latest trends we saw during the previous 12 months, and where we expect changes in the months ahead.Read more...
March 9, 2017 8:00 AM By Brandon Arvanaghi | Advanced Malware
March 8, 2017 12:15 PM By James T. Bennett | Advanced Malware
The FLARE team introduces two small tools to aid in reverse engineering Cocoa applications for macOS, explaining how the Objective-C runtime complicates code analysis in tools such as IDA Pro, and how to find useful entry points into a Cocoa application’s code to begin analysis.