Archive for 'August 2014'

    FLARE IDA Pro Script Series: Automatic Recovery of Constructed Strings in Malware

    | Advanced Malware
    The FireEye Labs Advanced Reverse Engineering (FLARE) Team is dedicated to sharing knowledge and tools with the community. We started with the release of the FLARE On Challenge in early July where thousands of reverse engineers and security enthusiasts participated. Stay tuned for a write-up of the challenge solutions in an upcoming blog post. This post is the start of a series where we look to aid other malware analysts in the Read more...


    Looking Ahead to MIRcon 2014

    By Helena Brito

    As targeted cyber attacks become increasingly prevalent, today's cybersecurity professionals are being tested like never before. The upcoming Mandiant Incident Response Conference (MIRcon®) - October 7 & 8, 2014 - offers attendees the chance to hear insights from some of the most respected and influential voices in the world of cybersecurity.

    Read more...


    Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks

    By Kyle Wilhoit, Thoufique Haq
    The Syrian Electronic Army has made news for its recent attacks on major communications websites, Forbes, and an alleged attack on CENTCOM. While these attacks garnered public attention, the activities of another group - The Syrian Malware Team - have gone largely unnoticed. The group’s activities prompted us to take a closer look. We discovered this group using a .NET based RAT called BlackWorm to infiltrate their targets. The Syrian Malware Team An error has occurred | FireEye

    An error has occurred

     

    Well that wasn’t supposed to happen. Something went wrong when trying to access this page. Please try again in a few minutes while we’re working on it.

    To send feedback about this error, click here.