A recent targeted attack featured attackers using different technologies to perform reconnaissance activities on a particular target. Users should disable Office macros in their settings and be extra vigilant when enabling macros (especially when prompted) in documents.Read more...
Entries filed under 'Threat Intel'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
May 18, 2016 8:00 AM By Richard Hummel, Ronghwa Chong, Adam Greenberg, John Miller, David Mainor | Advanced Malware
Ransomware - cyber extortion for financial gain - has been more popular since mid-2015, and FireEye noticed a significant spike in its use in March 2016.Read more...
March 28, 2016 8:00 AM By Nart Villeneuve | Advanced Malware
TREASUREHUNT is a POS malware that appears custom-built for a particular “dump shop” that sells stolen credit card data. TREASUREHUNT enumerates running processes, extracts payment card information from memory, and then transmits this information to a command and control server. This blog takes a closer look.
March 19, 2013 5:44 PM By Intel Team
September 7, 2012 5:01 PM By Helena Brito
Hard as it is to believe, September is upon us - with all the backpacks, early bedtimes and pumpkin spice lattes that entails. In keeping with back-to-school season, M-Unition is going to be focusing this month on learning - going back to the basics on cybersecurity and targeted threats.Read more...