Threat Intelligence Reports

Stealthy Tactics Define a Russian Cyber Threat Group

Read about the recently discovered HAMMERTOSS, a malware backdoor created by the Russian APT group APT29. Download the report to learn:

  • How HAMMERTOSS works—the five stages, from looking for a Twitter handle to executing commands, including uploading victim’s data to cloud storage services
  • Who APT29 is—their history, targets and methodology
  • Why it’s difficult to detect HAMMERTOSS

Stealthy Tactics Define a Russian Cyber Threat Group

Threat Intelligence on Advanced Attack Groups and Technology Vulnerabilities

FireEye regularly publishes threat intelligence reports that describe the members of advanced persistent threat (APT) groups, how they work, and how to recognize their tools, tactics, and procedures. Threat intelligence reports also cover vulnerabilities of specific business technologies, such as email, sandboxes, and mobile devices. With access to such details cyber security experts can build better defenses against these APT groups and advanced cyber attacks. 

An Inside Look: Into the World of Nigerian Scammers

Threat intelligence on a Nigeria-based scam, including its targets, tactics, organization, expertise, techniques, tools, and most importantly, how you can protect yourself from losing thousands of dollars.

Download Report

APT17: Hiding in Plain Sight - FireEye and Microsoft Expose Obfuscation Tactic

Threat intelligence on how the China-based APT17 group used Microsoft’s TechNet blog for its Command-and-Control (CnC) operation.

Download Report

APT30: The Mechanics Behind a Decade Long Cyber Espionage Operation

Threat intelligence on the APT30 group, which directed an extended cyber attack on government and commercial targets with critical political, economic, and military information.

Download Report

Threat Intelligence: Attack Groups

Threat Intelligence: Technologies