Quantcast
Channel: FireEye Blog » Targeted Attack
Browsing latest articles
Browse All 62 View Live

Image may be NSFW.
Clik here to view.

Havex, It’s Down With OPC

FireEye recently analyzed the capabilities of a variant of Havex (referred to by FireEye as “Fertger” or “PEACEPIPE”), the first publicized malware reported to actively scan OPC servers used for...

View Article


Image may be NSFW.
Clik here to view.

Pacific Ring of Fire: PlugX / Kaba

As depicted in earlier FireEye blogs, advanced cyber attacks are no strangers to the Asia Pacific region. In this blog, we take a deeper look at some of the advanced persistent threat (APT) malware...

View Article


Image may be NSFW.
Clik here to view.

Operation Poisoned Hurricane

Introduction Our worldwide sensor network provides researchers at FireEye Labs with unique opportunities to detect innovative tactics employed by malicious actors and protects our clients from these...

View Article

Black Hat USA Talks – Leviathan: Command And Control Communications On Planet...

Every day, computer network attackers leverage a Leviathan of compromised infrastructure, based in every corner of the globe, to play hide-and-seek with network security, law enforcement, and...

View Article

Image may be NSFW.
Clik here to view.

Darwin’s Favorite APT Group

Introduction The attackers referred to as APT12 (also known as IXESHE, DynCalc, and DNSCALC) recently started a new campaign targeting organizations in Japan and Taiwan. APT12 is believed to be a cyber...

View Article


Image may be NSFW.
Clik here to view.

The Path to Mass-Producing Cyber Attacks

Lines of people, lines of parts. The modern production line is composed of individuals contributing to a larger process. This common manufacturing approach is efficient, effective, and profitable. Now...

View Article

Data Theft in Aisle 9: A FireEye Look at Threats to Retailers

While cybercriminals continue to target the payment card and banking information of individual users, they seem increasingly aware that compromising retailers is more lucrative. Targeting retailers is...

View Article

Two Limited, Targeted Attacks; Two New Zero-Days

The FireEye Labs team has identified two new zero-day vulnerabilities as part of limited, targeted attacks against some major corporations. Both zero-days exploit the Windows Kernel, with Microsoft...

View Article


What are Java’s Biggest Vulnerabilities?

In our continuing mission to equip security professionals against today’s advanced cyber threats, FireEye has published a free technical report, “A Daily Grind: Filtering Java Vulnerabilities.” The...

View Article


Image may be NSFW.
Clik here to view.

Masque Attack: All Your iOS Apps Belong to Us

In July 2014, FireEye mobile security researchers have discovered that an iOS app installed using enterprise/ad-hoc provisioning could replace another genuine app installed through the App Store, as...

View Article
Browsing latest articles
Browse All 62 View Live