Introduction Through FireEye Dynamic Threat Intelligence (DTI), we observed RIG Exploit Kit (EK) delivering a dropper that leverages the PROPagate injection technique to inject code...
Read moreIntroduction Through FireEye Dynamic Threat Intelligence (DTI), we observed RIG Exploit Kit (EK) delivering a dropper that leverages the PROPagate injection technique to inject code...
Read moreIntroduction One of most significant recent developments in sophisticated offensive operations is the use of “Living off the Land” (LotL) techniques by attackers. These techniques leverage legitimate...
Read moreIntroduction In December 2017, FireEye's Mandiant discussed an incident response involving the TRITON framework. The TRITON attack and many of the publicly discussed ICS intrusions involved...
Read moreIntroduction In December 2017, FireEye's Mandiant discussed an incident response involving the TRITON framework. The TRITON attack and many of the publicly discussed ICS intrusions involved...
Read moreUsers have long needed to access important resources such as virtual private networks (VPNs), web applications, and mail servers from anywhere in the world at any time....
Read moreUsers have long needed to access important resources such as virtual private networks (VPNs), web applications, and mail servers from anywhere in the world at any time....
Read moreUsers have long needed to access important resources such as virtual private networks (VPNs), web applications, and mail servers from anywhere in the world at any time....
Read moreUsers have long needed to access important resources such as virtual private networks (VPNs), web applications, and mail servers from anywhere in the world at any time....
Read moreMetamorfo Campaigns Targeting Brazilian Users
April 24 2018FireEye Labs recently identified several widespread malspam (malware spam) campaigns targeting Brazilian companies with the goal of delivering banking Trojans. We are referring to these campaigns as Metamorfo....
Read more
Recent Comments