Entries filed under 'Advanced Malware'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
June 20, 2016 8:00 AM By Dr. Fahim Abbasi, Umair Ali Zafar, Muhammad Hasib Latif, Dr. Farrukh Shahzad, Safwan Khan | Threat Research, Advanced Malware
We recently detected the resurgence of a coin mining campaign with a novel and unconventional infection vector in the form of an iFRAME embedded in a PE binary.Read more...
September 23, 2016 10:30 AM By Ankit Anubhav , Dileep Kumar Jallepalli | Threat Research, Advanced Malware
Hancitor uses several capabilities within malicious macros that support malware installation and data theft. These capabilities include leveraging uncommon APIs and obscuring malicious PowerShell commands, tactics that make it a challenge to detect.
August 22, 2016 8:00 AM By Gordon Johnson | Threat Research, Advanced Malware
Connected devices are on the rise and here to stay. While they can make our lives much easier they also make easier targets for threat actors. Here we take a look at how someone could reverse engineer an embedded device, and at the process for attempting to find vulnerabilities.Read more...
August 17, 2016 12:15 PM By Ronghwa Chong | Advanced Malware