Our adversaries are familiar with the RTF format and the inner workings of Microsoft Word, and can devise obfuscation tricks to evade traditional signature-based detection. Understanding hackers perform obfuscation can in turn help us improve our detection of this type of malware.Read more...
Entries filed under 'Cyber'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
April 20, 2016 8:00 PM By FireEye Threat Intelligence | Threat Intelligence, Threat Research
FireEye has discovered FIN6, a cybercriminal group that is using stolen credit card information.Read more...
July 29, 2015 3:21 PM By FireEye Threat Intelligence | Threat Intelligence, Threat Research
The backdoor malware HAMMERTOSS uses commonly known tactics in a unique way that makes it a challenge to discover. The malware is used by APT29, a Russian threat group.