Home Malware Threats

Threats

Review Current Cyber Threats & Learn How To Protect Computers, Servers & Cloud Workloads. Threat intelligence and news reporting on the latest cyber adversaries an their tools. Prevent Cyber Attacks. The latest malware and APT information.

Abusing Replication: Stealing AD FS Secrets Over the Network

0
Organizations are increasingly adopting cloud-based services such as Microsoft 365 to host applications and data. Sophisticated threat actors are catching on and Mandiant has observed an increased focus on...

Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity

0
In July 2020, Mandiant Threat Intelligence released a public report detailing an ongoing influence campaign we named “Ghostwriter.” Ghostwriter is a cyber-enabled influence campaign which primarily targets audiences in...

Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise

0
In March 2021, Mandiant Managed Defense identified three zero-day vulnerabilities in SonicWall’s Email Security (ES) product that were being exploited in the wild. These vulnerabilities were executed in conjunction...

Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day

0
Executive Summary Mandiant recently responded to multiple security incidents involving compromises of Pulse Secure VPN appliances. This blog post examines multiple, related techniques for bypassing single and multifactor authentication on Pulse...

Hacking Operational Technology for Defense: Lessons Learned From OT Red Teaming Smart Meter Control Infrastructure

0
High-profile security incidents in the past decade have brought increased scrutiny to cyber security for operational technology (OT). However, there is a continued perception across critical infrastructure organizations that...

M-Trends 2021: A View From the Front Lines

0
We are thrilled to launch M-Trends 2021, the 12th edition of our annual FireEye Mandiant publication. The past year has been unique, as we witnessed an unprecedented combination of...

A deep dive into Saint Bot, a new downloader

0
Saint Bot is a downloader that has been used to drop stealers. We take a deep look at it and its accompanying panel. This post was authored by Hasherezade...

Aurora campaign: Attacking Azerbaijan using multiple RATs

0
We identified a new Python-based RAT targeting Azerbaijan from the same threat actor we profiled a month ago. This post was authored by Hossein Jazi As tensions between Azerbaijan and...

Back in a Bit: Attacker Use of the Windows Background Intelligent Transfer Service

0
In this blog post we will describe: How attackers use the Background Intelligent Transfer Service (BITS) Forensic techniques for detecting attacker activity with data format specifications Public release of the BitsParser tool A...

New steganography attack targets Azerbaijan

0
A lure document targeting Azerbaijan uses steganography to conceal a remote administration Trojan. This blog post was authored by Hossein Jazi Threat actors often vary their techniques to thwart security...