On June 27, 2017, multiple organizations – many in Europe – reported significant disruptions they are attributing to a variant of the Petya ransomware, which we are calling “EternalPetya”.Read more...
Entries filed under 'Exploit'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
June 2, 2017 9:00 AM By Ali Islam, Barry Vengerik, Zain Gardezi , Christopher Glyer, Haroon W Malik | Advanced Malware
May 26, 2017 11:00 AM By Ali Islam, Nicole Oppenheim, Winny Thomas
The recent WannaCry ransomware takes advantage of a Server Message Block vulnerability to compromise Windows machines, load malware, and propagate to other machines in a network.Read more...
July 14, 2016 4:37 PM By Kenneth Johnson , Yasir Khalid, Dan Caselden, Sai Omkar Vashisht | Exploits
The Neutrino EK adopted an open-source exploit and now uses it to embed multiple exploits into a SWF file.
June 6, 2016 8:00 AM By Raghav Pande, Amit Malik | Exploits
Exploits kit have become increasingly sophisticated throughout the years. Where obfuscation and new zero days were once the only additions in the development cycle, evasive code is now being embedded into the framework and shellcode.Read more...