Nation-state threat actors are using web analytics on compromised sites to compile profiles of users for reconnaissance purposes.Read more...
Entries filed under 'FireEye Threat Intelligence'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
July 29, 2015 3:21 PM By FireEye Threat Intelligence | Threat Intelligence
The backdoor malware HAMMERTOSS uses commonly known tactics in a unique way that makes it a challenge to discover. The malware is used by APT29, a Russian threat group.
Second Adobe Flash Zero-Day CVE-2015-5122 from HackingTeam Exploited in Strategic Web Compromise Targeting Japanese VictimsJuly 27, 2015 12:35 PM By FireEye Threat Intelligence | Threat Intelligence
FireEye researched discovered a second Adobe Flash zero-day attack within leak of the Italian HackingTeam’s internal data.Read more...
Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team LeakJuly 13, 2015 9:31 AM By FireEye Threat Intelligence | Threat Intelligence
Two Chinese Advanced Persistent Threat (APT) groups quickly adapted their approach after details came to light about a zero-day vulnerability.Read more...
Hacking the News: Global News Media Firms and Small Market Outlets In the Crosshairs of Cyber Threat GroupsJune 2, 2015 4:00 AM By FireEye Threat Intelligence | Targeted Attack
ISIS and some of their sympathizers are targeting the media through hacking operations. It carries significant implications for several reasons: 1) they have successfully managed to take a news network off the air; 2) they've hacked into social media and wreaked havoc on the stock market; and 3) in some cases, they appear to be government-sponsored groups carrying out a larger political agenda.