Our fifth M-Trend, taken from this year's M-Trends report, is a mouthful: attackers are targeting companies that collaborate within a supply chain in order to assemble a comprehensive intellectual property portfolio. However, our short title, Some Assembly Required, sums it up pretty well. What it boils down to is that attackers have moved beyond simply targeting individual companies for a single technology. Since 2011, we have seen clear indications that attackers are being instructed to go after more complex technologies that span multiple organizations.Read more...
Entries filed under 'APT'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
M-Trends #5 – Some Assembly Required: Attackers Are Targeting Companies That Collaborate Within a Supply ChainMay 23, 2012 1:21 PM By Grady Summers
May 21, 2012 4:14 PM By Grady Summers
May 18, 2012 3:00 PM By Grady Summers
I was somewhat unnerved when I saw the evidence for our #3M-Trend this year: the use of publicly available malware in targeted attacks is increasing. After all, when I first started learning about the Advanced Persistent Threat (APT) several years ago, it seemed to be all about custom backdoors and proprietary tools. I remember briefing executives at my organization on how stealthy the attackers were, using never-before-seen methods to evade antivirus and infiltrate the organization. Yet the recent evidence was clear: every intrusion we had investigated in the last year leveraged some sort of publicly available malware.Read more...
May 15, 2012 7:24 PM By Helena Brito
It is no secret that nation states like China and Russia are attacking U.S.-based businesses in an attempt to steal valuable trade secrets. From a cybersecurity perspective, a key question organizations face is whether they should focus on reactively protecting assets from the bad guys, or to take a more proactive approach to find and contain adversaries who are already in their environment.Read more...
May 14, 2012 4:45 PM By Grady Summers