WMImplant leverages WMI for the command and control channel, the means for executing actions (gathering data, issuing commands, etc.) on the targeted system, and data storage.Read more...
No such category found
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
March 15, 2017 8:48 AM By Zain Gardezi | Advanced Malware
FireEye researchers showcase some of the prominent malvertising campaigns active over the last four months, as well as the cushion servers related to different exploit kits.Read more...
March 14, 2017 8:00 AM By Jurgen Kutscher | Threat Intelligence
FireEye releases M-Trends 2017 with the latest trends we saw during the previous 12 months, and where we expect changes in the months ahead.Read more...
March 9, 2017 8:00 AM By Brandon Arvanaghi | Advanced Malware
March 8, 2017 12:15 PM By James T. Bennett | Advanced Malware
The FLARE team introduces two small tools to aid in reverse engineering Cocoa applications for macOS, explaining how the Objective-C runtime complicates code analysis in tools such as IDA Pro, and how to find useful entry points into a Cocoa application’s code to begin analysis.