Entries filed under 'Malware'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
M-Trends #6 – It Pays To Be Persistent: Financially Motivated Attackers Are Shifting Toward Long-Term PresenceMay 25, 2012 2:03 PM By Grady Summers
M-Trends #5 – Some Assembly Required: Attackers Are Targeting Companies That Collaborate Within a Supply ChainMay 23, 2012 1:21 PM By Grady Summers
Our fifth M-Trend, taken from this year's M-Trends report, is a mouthful: attackers are targeting companies that collaborate within a supply chain in order to assemble a comprehensive intellectual property portfolio. However, our short title, Some Assembly Required, sums it up pretty well. What it boils down to is that attackers have moved beyond simply targeting individual companies for a single technology. Since 2011, we have seen clear indications that attackers are being instructed to go after more complex technologies that span multiple organizations.Read more...
May 21, 2012 4:14 PM By Grady Summers
May 18, 2012 3:00 PM By Grady Summers
I was somewhat unnerved when I saw the evidence for our #3M-Trend this year: the use of publicly available malware in targeted attacks is increasing. After all, when I first started learning about the Advanced Persistent Threat (APT) several years ago, it seemed to be all about custom backdoors and proprietary tools. I remember briefing executives at my organization on how stealthy the attackers were, using never-before-seen methods to evade antivirus and infiltrate the organization. Yet the recent evidence was clear: every intrusion we had investigated in the last year leveraged some sort of publicly available malware.Read more...