Entries filed under 'APT'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
May 18, 2012 3:00 PM By Grady Summers
I was somewhat unnerved when I saw the evidence for our #3M-Trend this year: the use of publicly available malware in targeted attacks is increasing. After all, when I first started learning about the Advanced Persistent Threat (APT) several years ago, it seemed to be all about custom backdoors and proprietary tools. I remember briefing executives at my organization on how stealthy the attackers were, using never-before-seen methods to evade antivirus and infiltrate the organization. Yet the recent evidence was clear: every intrusion we had investigated in the last year leveraged some sort of publicly available malware.Read more...
May 15, 2012 7:24 PM By Helena Brito
It is no secret that nation states like China and Russia are attacking U.S.-based businesses in an attempt to steal valuable trade secrets. From a cybersecurity perspective, a key question organizations face is whether they should focus on reactively protecting assets from the bad guys, or to take a more proactive approach to find and contain adversaries who are already in their environment.Read more...
May 14, 2012 4:45 PM By Grady Summers
April 16, 2012 4:08 PM By Richard Bejtlich
Recently you may have heard comments to the effect that "Every major company in the United States has already been penetrated by China," or "there are two kinds of Fortune 500 companies: those that know they've been hacked, and those that don't yet know". I thought it might be helpful to share Mandiant's perspective based on the incident response work we do for our product and professional services customers.Read more...