We recently detected the resurgence of a coin mining campaign with a novel and unconventional infection vector in the form of an iFRAME embedded in a PE binary.Read more...
Entries filed under 'Threat Research'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
August 10, 2015 1:49 PM By Sudeep Singh, Dan Caselden
The Angler Exploit Kit (EK) recently added support for an Internet Explorer (IE) vulnerability (CVE-2015-2419) that was patched in July 2015.Read more...
April 8, 2015 12:30 PM By Zhaofeng Chen, Yulong Zhang, Hui Xue, Tao Wei
Phantom vulnerability (CVE-2015-1118) leads to multiple UAF issues in libsystem_network.dylib and puts the system into a coma state. In this blog we describe the causes, the symptoms and the solutions of Phantom attacks to protect users from such a threat.Read more...
March 23, 2015 12:00 PM By Dan Caselden, Genwei Jiang, Corbin Souffrant | Exploits
The security industry is responding to the increased focus on Flash exploits, but hasn't yet done much to improve detection rates.