A recent targeted attack featured attackers using different technologies to perform reconnaissance activities on a particular target. Users should disable Office macros in their settings and be extra vigilant when enabling macros (especially when prompted) in documents.Read more...
Entries filed under 'Targeted Attack'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
October 6, 2014 10:00 AM By Nart Villeneuve | Targeted Attack
September 3, 2014 7:00 PM By Ned Moran, Mike Oppenheim | Threat Intelligence, Threat Research, Botnets, Targeted Attack
September 17, 2014 7:28 PM By Jen Weedon | Threat Intelligence, Threat Research
Today, the Senate Armed Services Committee released information indicating that China-based threat actors were heavily targeting TRANSCOM, the U.S. military’s logistics arm. In terms of the private sector contractors impacted, the intrusions detailed in the Levin report mirror activity FireEye has observed: we frequently see nation state threat actors target not only government, but also private sector organizations in order to obtain military intelligence.Read more...
February 13, 2009 4:01 AM By Alex Lanstein