On June 27, 2017, multiple organizations – many in Europe – reported significant disruptions they are attributing to a variant of the Petya ransomware, which we are calling “EternalPetya”.Read more...
Entries filed under 'Exploit'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
June 2, 2017 9:00 AM By Ali Islam, Barry Vengerik, Christopher Glyer, Haroon W Malik, Zain Gardezi | Advanced Malware, Threat Research
May 26, 2017 11:00 AM By Ali Islam, Nicole Oppenheim, Winny Thomas | Threat Research
The recent WannaCry ransomware takes advantage of a Server Message Block vulnerability to compromise Windows machines, load malware, and propagate to other machines in a network.Read more...
July 14, 2016 4:37 PM By Kenneth Johnson , Dan Caselden, Sai Omkar Vashisht, Yasir Khalid | Exploits, Threat Research
The Neutrino EK adopted an open-source exploit and now uses it to embed multiple exploits into a SWF file.
June 6, 2016 8:00 AM By Raghav Pande, Amit Malik | Exploits, Threat Research
Exploits kit have become increasingly sophisticated throughout the years. Where obfuscation and new zero days were once the only additions in the development cycle, evasive code is now being embedded into the framework and shellcode.Read more...