Entries filed under 'Zero-day'

Threat Research Blog

The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.


    EPS Processing Zero-Days Exploited by Multiple Threat Actors

    By Genwei Jiang, Greg Macmanus, Dhanesh Kizhakkinan, Ben Read, Alex Lanstein, Alex Berry

    FireEye recently identified three new zero-day vulnerabilities in Microsoft Office products that are being exploited in the wild.

    Read more...


    CVE-2017-0199 Used as Zero Day to Distribute FINSPY Espionage Malware and LATENTBOT Cyber Crime Malware

    By Ben Read, Jonathan Leathery

    FireEye assesses with moderate confidence that CVE-2017-0199 was leveraged by financially motivated and nation-state actors prior to its disclosure.

    Read more...


    CVE-2017-0199: In the Wild Attacks Leveraging HTA Handler

    By Genwei Jiang, Jonathan Leathery, Alex Berry, Rahul Mohandas, Lennard Galang

    FireEye recently detected malicious Microsoft Office RTF documents that leverage CVE-2017-0199, a previously undisclosed vulnerability.

    Read more...


    Acknowledgement of Attacks Leveraging Microsoft Zero-Day

    By Genwei Jiang

    FireEye recently detected malicious Microsoft Office RTF documents that leverage a previously undisclosed vulnerability and shared the details of the vulnerability with Microsoft.

    Read more...

    An error has occurred

     

    Well that wasn’t supposed to happen. Something went wrong when trying to access this page. Please try again in a few minutes while we’re working on it.

    To send feedback about this error, click here.