On June 27, 2017, multiple organizations – many in Europe – reported significant disruptions they are attributing to a variant of the Petya ransomware, which we are calling “EternalPetya”.Read more...
Entries filed under 'Exploit'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
June 2, 2017 9:00 AM By Ali Islam, Barry Vengerik, Zain Gardezi , Christopher Glyer, Haroon W Malik | Advanced Malware
May 26, 2017 11:00 AM By Ali Islam, Nicole Oppenheim, Winny Thomas
The recent WannaCry ransomware takes advantage of a Server Message Block vulnerability to compromise Windows machines, load malware, and propagate to other machines in a network.Read more...
July 14, 2016 4:37 PM By Kenneth Johnson , Yasir Khalid, Dan Caselden, Sai Omkar Vashisht | Exploits
The Neutrino EK adopted an open-source exploit and now uses it to embed multiple exploits into a SWF file.
June 6, 2016 8:00 AM By Raghav Pande, Amit Malik | Exploits
Exploits kit have become increasingly sophisticated throughout the years. Where obfuscation and new zero days were once the only additions in the development cycle, evasive code is now being embedded into the framework and shellcode.Read more...