Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'FireEye Research' | www.SecurityPhresh.com
Security News from 'FireEye Research'
Showing 'Security News from 'FireEye Research'' from 51 to 60
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets
26th Jan 2018 [7 months ago] from FireEye Research
FireEye hasdiscovered a campaign leveraging the recently announced zero-dayCVE-2013-3893. This campaign, which we have labeled ‘OperationDeputyDog, began as early as August 19, 2013 and appears to havetargeted organizations in Japan....
Hand Me Downs: Exploit And Infrastructure Reuse Among APT Campaigns
26th Jan 2018 [7 months ago] from FireEye Research
Since we first reported on OperationDeputyDog, at least three other Advanced Persistent Threat(APT) campaigns known as Web2Crew, Taidoor, and th3bug have made useof the same exploit to deliver their own payloads to their owntargets. It...
Evasive Tactics: Taidoor
26th Jan 2018 [7 months ago] from FireEye Research
The Taidoor malware has been used in many ongoing cyber espionagecampaigns. Its victims include government agencies, corporateentities, and think tanks, especially those with interests in Taiwan.[1] In a typical attack, targets receive...
Darkleech Says Hello
26th Jan 2018 [7 months ago] from FireEye Research
Theres never a dull day at FireEye -- even onthe weekends. At approximately 7:29 AM PDT today, we were notified byseveral security researchers that a fireeye[.]com/careers HR link wasinadvertently serving up a drive-by download exploit. Our...
The Sunshop Campaign Continues
26th Jan 2018 [7 months ago] from FireEye Research
We recently detected what we believe is a continuation of the Sunshopcampaign that we first revealed on May 20, 2013.This follow-on to the Sunshop campaign started on July 17, 2013. Inthis latest wave the attackers inserted malicious redirects...
Survival Of The Fittest: New York Times Attackers Evolve Quickly
26th Jan 2018 [7 months ago] from FireEye Research
The attackers behind the breach of the New York Times’ computernetwork late last year appear to be mounting fresh assaults thatleverage new and improved versions of malware.The new campaigns mark the first significant stirrings from thegroup...
Poison Ivy: Assessing Damage And Extracting Intelligence
26th Jan 2018 [7 months ago] from FireEye Research
Today, our research team is publishing a reporton the Poison Ivy family of remote access tools (RATs) along with apackage of tools created to work as a balm of sorts — naturally, we’recalling the package “Calamine.”In an era of...
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
26th Jan 2018 [7 months ago] from FireEye Research
Dont be too hasty to link every Poison Ivy-based cyber attack toChina. The popular remote access tool (RAT), whichwe recently detailed on this blog, is being used in a broadcampaign of attacks launched from the Middle East, too.First, some...
Njw0rm - Brother From The Same Mother
26th Jan 2018 [7 months ago] from FireEye Research
FireEye Labs hasdiscovered an intriguing new sibling of the njRAT remote access tool(RAT) that one-ups its older brother with a couple ofdiabolically clever features. Created by the same author as njRAT —afreelance coder who goes by the...
Breaking Down The China Chopper Web Shell - Part II
26th Jan 2018 [7 months ago] from FireEye Research
Part II in a two-part series. Read Part I.Introduction In PartI of this series, I described China Choppers easy-to-useinterface and advanced features — all the more remarkable consideringthe Web shells tiny size: 73 bytes for the aspx...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »