I was somewhat unnerved when I saw the evidence for our #3M-Trend this year: the use of publicly available malware in targeted attacks is increasing. After all, when I first started learning about the Advanced Persistent Threat (APT) several years ago, it seemed to be all about custom backdoors and proprietary tools. I remember briefing executives at my organization on how stealthy the attackers were, using never-before-seen methods to evade antivirus and infiltrate the organization. Yet the recent evidence was clear: every intrusion we had investigated in the last year leveraged some sort of publicly available malware.Read more...
Entries filed under 'Mandiant'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
M-Trends #2: Everything Old is New Again - Targeted Attackers Using Passive Backdoors to Evade NetworksMay 16, 2012 2:54 PM By Grady Summers
May 15, 2012 7:24 PM By Helena Brito
It is no secret that nation states like China and Russia are attacking U.S.-based businesses in an attempt to steal valuable trade secrets. From a cybersecurity perspective, a key question organizations face is whether they should focus on reactively protecting assets from the bad guys, or to take a more proactive approach to find and contain adversaries who are already in their environment.Read more...
May 14, 2012 4:45 PM By Grady Summers
April 23, 2012 5:18 PM By Aaron LeMasters
I am excited to be speaking at SyScan Singapore 2012 today. SyScan has a reputation for being a high-quality, extremely technical conference, as you can tell by the impressive line-up of speakers. In my presentation, I/O, You Own: Regaining Control of your Disk in the Presence of Bootkits," I will debut operating system research I've been working on for the past few months.Read more...