For years, payment card fraud has been extremely profitable for malicious actors. FireEye Labs has recently observed a Brazilian group that specializes in payment card fraud operations, using several methods to compromise and aquire already compromised payment card credientials.Read more...
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
October 7, 2016 8:00 AM By Muhammad Hasib Latif, Dr. Farrukh Shahzad | Threat Intelligence, Advanced Malware
Malware writers are always looking for new ways to evade analysis frameworks and sandboxes to successfully breach targeted environments and platforms. WMI provides a simple way of environment detection to evade sandboxes and dynamic analysis tools, which seem to be underestimated by the security community. This blog looks at evasion samples.Read more...
September 29, 2016 8:00 AM By FireEye iSIGHT Intelligence | Threat Intelligence
September 23, 2016 10:30 AM By Ankit Anubhav , Dileep Kumar Jallepalli | Advanced Malware
Hancitor uses several capabilities within malicious macros that support malware installation and data theft. These capabilities include leveraging uncommon APIs and obscuring malicious PowerShell commands, tactics that make it a challenge to detect.
September 13, 2016 10:20 AM By Nick Harbour | Vulnerabilities
FireEye will host the third annual FireEye Labs Advanced Reverse Engineering (FLARE) team challenge beginning September 23rd. This six-week challenge is open to all active and aspiring reverse engineers, malware analysts and security professionals.