A newly discovered botnet implements several layers of obfuscation and can corrupt a hard disk, entirely wiping it clean.Read more...
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
December 9, 2015 12:00 PM By J. Gomez, Kenneth Hsu, Kenneth Johnson | Exploits, Threat Research
Users who clicked on a URL on the website theguardian[.]com to read an article on cybercrime were silently redirected to the Angler Exploit Kit.
December 7, 2015 8:00 AM By Dimiter Andonov, Jay Taylor , Nalani Fraser, Will Matson, Willi Ballenthin | Advanced Malware, Threat Research
A threat group is targeting payment card data using sophisticated malware that can continue operating even after the operating system has been reinstalled.
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media OutletsDecember 1, 2015 8:00 AM By FireEye Threat Intelligence | Threat Intelligence, Threat Research
A spear-phishing campaign that targets Hong Kong-based media organizations is using Dropbox for its malware communications.
ModPOS: Highly-Sophisticated, Stealthy Malware Targeting US POS Systems with High Likelihood of Broader CampaignsNovember 24, 2015 12:01 AM By Stephen Ward | Threat Research
Today, iSIGHT Partners is sharing details about a highly sophisticated criminal malware framework that has been used to target point-of-sale (POS) systems at US-based retailers. We believe this very hard to detect malware is likely being used in broader campaigns and are disclosing details to help retailers and other organizations with POS and other payment processing systems hunt for and eradicate the malware.Read more...