Texture Top Right Green 04

Tales from the Trenches

FireEye Managed Defense in Action

WannaMine My Business

Breaches are inevitable, which is why it’s important to have a plan in place to act quickly and minimize the damage. FireEye was engaged by a government sector client to investigate a suspected breach, where at least one instance of WannaMine, cryptocurrency malware was discovered running as an admin on the client network. Find out how the FireEye Mandiant team effectively contained and eradicated the threat and was able to increase the security posture of the client’s environment in the process.

Cloudy Days

Cloudy Days

Are you reliant upon third party service providers? If so, do you know if they’re protecting your valuable data? Read more to find out what happened when one Managed Defense client thought their security provider was providing more protection than they were.

Cloudy Days

Backdoor Credentials

Even the most advanced Security teams sometimes need support, especially when attackers are using legitimate credentials to gain access. Find out how Managed Defense analysts actively observed attacker activity to fully contain and remediate against a determined attacker.

Backdoor Credentials

Cobalt Strikeout

Sometimes, malicious activity can be hiding in plain sight, masquerading as legitimate activity that turns out to be more than what it appears. Read more to see how one analyst’s intuition and probing led to collaborating with multiple team resources within FireEye to discover, attribute, and contain a threat in under 4 hours.

Cobalt Strikeout

Spearphishing Takeout

Technology alone does not fully protect against today’s sophisticated cyber-attacks. FireEye Managed Defense analysts comprehensively and systematically hunt for evidence of activity from threat actors. Find out how frontline experience and home-grown tools enabled analysts to find and remove an attacker while helping to protect all FireEye customers in the process.

Spearphishing Takeout

Exterminating a RAT

Limited visibility into customers' environments can often times hinder investigations. Find out how Managed Defense analysts used front line experience to gain visibility into a network only customer to comprehensively remediate an attacker.

Exterminating a RAT