Over the past few years, we have been tracking a suspected Iranian group with potential destructive capabilities whom we call APT33.Read more...
Entries filed under 'Iran'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive MalwareSeptember 20, 2017 10:00 AM By Jaqueline O’Leary, Josiah Kimble, Kelli Vanderlee, Nalani Fraser | Threat Research
May 13, 2014 9:00 AM By Nart Villeneuve, Mike Scott, Ned Moran, Thoufique Haq | Threat Research
June 17, 2013 4:40 PM By Intel Team
There's often a lot of rhetoric in the press and in the security community around threats to the utilities industry, and risk exposure surrounding critical infrastructure. We've determined that the utilities industry (power, water, waste) has been, and likely will continue to be, a target for cyber espionage primarily from Chinese APT groups. We also anticipate that U.S. utilities infrastructure is vulnerable to computer network attack (CNA) from a variety of threat actors motivated by a desire to disrupt, deny access, or destroy. It's important to recognize the difference between actors seeking to steal data or intellectual property, and actors seeking to destroy systems or cause mass destruction. Often the distinction between computer network exploitation (CNE) and CNA gets lost in media coverage that bundles diverse cyber activity together. The type of cyber activity has implications for how we tackle the problem, thus it's key to distinguish.Read more...