A new variant of a Point of Sale (POS) malware family is highly targeted, digitally signed, and exfiltrates stolen payment card over DNS.Read more...
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
April 13, 2016 9:00 AM By Daniel Regalado, Erye Hernandez, Taha Karim, Varun Jain | Threat Research, Vulnerabilities
April 7, 2016 8:30 AM By Genwei Jiang | Exploits, Threat Research
An in-the-wild exploit kit, Magnitude EK, was exploiting a previously unknown vulnerability in Adobe Flash Player and achieving remote code execution on recent versions of Flash Player. Thanks to Adobe's new exploit mitigations, it's now failing.Read more...
April 4, 2016 8:30 AM By Jing Xie, Jimmy Su | Threat Research, Vulnerabilities
FireEye has seen the development of various third-party solutions that allow developers to remotely hot patch an iOS app on a non-jailbroken device without going through Apple’s review process, leading to security risks. This blog examines Rollout.io, a commercial solution that addresses the remote patching problem while remaining focused on security.Read more...
March 28, 2016 8:00 AM By Nart Villeneuve | Advanced Malware, Threat Research
TREASUREHUNT is a POS malware that appears custom-built for a particular “dump shop” that sells stolen credit card data. TREASUREHUNT enumerates running processes, extracts payment card information from memory, and then transmits this information to a command and control server. This blog takes a closer look.