Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
April 7, 2016 8:30 AM By Genwei Jiang | Exploits, Threat Research
An in-the-wild exploit kit, Magnitude EK, was exploiting a previously unknown vulnerability in Adobe Flash Player and achieving remote code execution on recent versions of Flash Player. Thanks to Adobe's new exploit mitigations, it's now failing.Read more...
April 4, 2016 8:30 AM By Jing Xie, Jimmy Su | Threat Research, Vulnerabilities
FireEye has seen the development of various third-party solutions that allow developers to remotely hot patch an iOS app on a non-jailbroken device without going through Apple’s review process, leading to security risks. This blog examines Rollout.io, a commercial solution that addresses the remote patching problem while remaining focused on security.Read more...
March 28, 2016 8:00 AM By Nart Villeneuve | Advanced Malware, Threat Research
TREASUREHUNT is a POS malware that appears custom-built for a particular “dump shop” that sells stolen credit card data. TREASUREHUNT enumerates running processes, extracts payment card information from memory, and then transmits this information to a command and control server. This blog takes a closer look.
March 25, 2016 8:00 AM By Haowei Ren, Alex Berry, Jonell Baltazar , Joonho Sa, Ronghwa Chong | Advanced Malware, Threat Research
FireEye Labs is seeing a huge detection spike due to a pair of concurrent email spam campaigns that are affecting more than 50 different countries.Read more...