Articles about mandiant


FireEye hacked off at claim it hacked Chinese military's hackers

US security company FireEye has denied a claim aired in a new book that it hacked into laptops owned by Chinese military hackers. It's common knowledge that prior to its acquisition by FireEye, the security concern Mandiant brought the Chinese operation known as APT1 undone. In its 2013 report, the company attributed espionage …

PasteBin data dump: Hackers claim files are from Mandiant FireEye 'breach'

Hackers have leaked what they claim is information stolen from FireEye/Mandiant after apparently breaking into the incident response biz's network. Mandiant has denied this. The miscreants, who branded their attack campaign "Op #LeakTheAnalyst," claimed in a preface to their PasteBin dump that they had "breached [Mandiant's] …
John Leyden, 31 Jul 2017

Doing business with Asia? Then worry more about security

Organisations across the Asia Pacific are terrible at information security, a Mandiant report contests. While businesses in the United States will detect a hacker in their networks within four months, in line with the global average, it takes 17 months for those in the Asia Pacific region to notice their intruder. The region …
Darren Pauli, 25 Aug 2016
Burglar sits in kitchen with stolen tablet. Photo by Shutterstock

Cyber burglars love to pillage Euro businesses they've pwned before

Traditional methods including spear phishing and social engineering still account for more than a third of hacker attacks. A new study by Mandiant reports that many hacked European organisations are re–compromised within months of an initial attack, in a similar way to how burglars revisit homes and offices they’ve already …
John Leyden, 8 Jun 2016
Tony Montana on the phone in Scarface

Online crims delight in watching you squirm, says Mandiant

Criminals behind ransomware attacks are drinking the digital disruption Kool-Aid, changing their attack methods in new and nasty ways to target business according to forensics outfit Mandiant. Ransomware and extortion hacks are on the up, the firm says, along with the quiet compromise of code. It is part of the findings into …
Darren Pauli, 26 Feb 2016
Cartoon man with hat and tie. Facial features replaced by question mark.

Inside Mandiant's biggest forensics breach battle: Is this Anthem?

Cyber Defence Summit Four researchers from American cybersecurity firm Mandiant have engaged in an eight-month epic battle against hackers behind one of the biggest breaches of this year. The quartet is not saying who the victim is, nor identifying the attackers. However, it is at the level of, and very-well could be, health insurers Anthem or …
Darren Pauli, 15 Oct 2015
The launch explosion, captured in a Sea Launch video

Identity thieves slurp Sony Pictures staff info – as CEO sends 'don't sue me, bro' memo

Criminals are picking through gigabytes of leaked personal information from Sony Pictures' ransacked computer network, triggering identity theft alerts, staff have told The Register. We're told crooks are, as is inevitable these days, mining files dumped online by hackers, who comprehensively compromised the movie studio's …
Iain Thomson, 8 Dec 2014
Kim Jong-un

Norks: We might be aggressive but we didn't hack Sony!

North Korea has denied it was the entity behind the epic hack of Sony Pictures Entertainment. An unnamed diplomat based in New York told The Voice of America the country was not linked to the attack despite speculation patriotic hackers had targeted the media giant in retaliation for a satirical film mocking leader Kim Jong Un …
Darren Pauli, 5 Dec 2014

Sony Pictures hires Mandiant, asks FBI for help after massive cyber attack

Sony Pictures Entertainment (SPE) has hired FireEye’s Mandiant forensics unit to help it clean up the huge cyber attack that knocked out its network and forced its employees to put pen to paper over the last few weeks. The company has also asked the FBI to investigate the incident and look into the leak of four of its upcoming …

Chinese APT groups targeting Australian lawyers

Law firms are among Australian businesses being targeted by at least 13 Chinese advanced malware groups in a bid to steal intelligence from big business, says forensics bod and Mandiant man Mark Goudie. The attacks are well planned and rely on a combination of stealth and persistence in order to extract any and all valuable …
Darren Pauli, 21 Oct 2014

Pen-testers outline golden rules to make hacks more €xpen$ive

Podcast Not one administrator to rule them all, but a few: that's the advice offered by seasoned penetration testers Aaron Beuhring and Kyle Salous to enterprises wanting to be less attractive to hackers. In a presentation at the MIRCon 2014 conference in Washington the duo listed a series of low cost changes to access controls, …
Darren Pauli, 9 Oct 2014

Mandiant to probe gaps in rusty unpatchable utility systems

Mandiant has launched a managed gap assessment for industrial control systems (ICS) it says will help administrators deal with temperamental systems. It was a "light touch" for legacy or leviathan systems that could fall over in the event of tinkering or patching. Mandiant SCADA bod Dan Scali said the system was geared to …
Darren Pauli, 8 Oct 2014

What's happened since Beijing's hacker unit was exposed? Nothing

Chinese hacker unit PLA 61398 is hacking US companies harder than ever after bilateral talks between Beijing and Washington were interrupted by Snowden leaks, according to Mandiant boss Kevin Mandia. The hack squad, also known as APT1, was subject to a high profile exposure by the company in February last year. Its state- …
Darren Pauli, 8 Oct 2014
Australia China

Latest IE flaw being actively exploited

AusCERT April's Internet Explorer flaw is being exploited, with at least two listed Australian entities targeted by a sophisticated foreign hacking outfit. The organisations were targeted in a campaign that foisted the Internet Explorer exploits (MS14-021) at high end corporations three days after the dangerous flaws were exposed. …
Darren Pauli, 15 May 2014

One year on: diplomatic fail as Chinese APT gangs get back to work

The Chinese operatives behind two major advanced persistent threat (APT) groups have fully resumed their activities despite being exposed publically last year, in a sign that diplomatic efforts by the US aren’t working, according to Mandiant. The FireEye-owned company said in its M-Trends report that over the past year it has …
Phil Muncaster, 11 Apr 2014

FireEye buys outfit that lifted the lid on Chinese cyber-espionage

Threat prevention firm FireEye has acquired privately held net security firm Mandiant. The cash and shares deal, announced Monday, is valued at around $1bn. Mandiant is best known for its landmark study into the Chinese APT1 hacking crew last year, which exposed the organisation's tactics and evidence of its links to the …
John Leyden, 3 Jan 2014

Chinese hacker bust drove crims underground says report

The public exposure of Chinese hacking group APT1 and its alleged affiliation to the People’s Liberation Army has done nothing but drive its members deeper underground, according to a US congressional report. The US-China Economic and Security Commission, which advises Congress on China, said in a draft report seen by Reuters …
china hacking

China's exposed crack cyberspy crew dumps 'most' of its kit

The infamous APT1 cyberespionage crew is diminished but not defeated following its public exposure three months ago. Mandiant, the cyber security intelligence firm that d0xed APT1, detailing its tools and tactics as well as its affiliation to a Chinese People's Liberation Army unit, has published a follow-up report this week …
John Leyden, 23 May 2013

Create a news alert about mandiant, or find more stories about mandiant.

Biting the hand that feeds IT © 1998–2018