Threat Intelligence Reports

Pinpointing Targets: Exploiting Web Analytics to Ensnare Victims

Threat intelligence on how attackers use web analytics and open source tools to track and profile victims and possibly infect the victims’ computers with targeted malware. Download the report to understand the:

  • Step-by-step process of how the profiling script called WITCHCOVEN works
  • Who the attackers are that leverage this approach
  • Types and locations of industries and organizations being targeted
  • Ways you can protect your information

WITCHCOVEN Video

WITCHCOVEN Video

See how WITCHCOVEN uses web analytics to profile and infect targets with malware. (video - 1:26 min)

Threat Intelligence on Advanced Attack Groups and Technology Vulnerabilities

FireEye regularly publishes threat intelligence reports that describe the members of advanced persistent threat (APT) groups, how they work, and how to recognize their tools, tactics, and procedures. Threat intelligence reports also cover vulnerabilities of specific business technologies, such as email, sandboxes, and mobile devices. With access to such details cyber security experts can build better defenses against these APT groups and advanced cyber attacks. 

Pinpointing Targets: Exploiting Web Analytics to Ensnare Victims

Threat intelligence on how attackers alter websites and redirect visitors to a profiling script called WITCHCOVEN.

Download Report

HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group

Threat research about the recently discovered HAMMERTOSS, a malware backdoor created by the Russian APT group APT29.

Download Report

An Inside Look: Into the World of Nigerian Scammers

Threat intelligence on a Nigeria-based scam, including its targets, tactics, organization, expertise, techniques, tools, and most importantly, how you can protect yourself from losing thousands of dollars.

Download Report

Threat Intelligence: Independent Research

 


Threat Intelligence: Attack Groups

Threat Intelligence: Technologies