FireEye Says It Was Hacked by a Nation-State

Discussion in 'other security issues & news' started by hawki, Dec 8, 2020.

  1. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,130
    Location:
    DC Metro Area
  2. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,130
    Location:
    DC Metro Area
    "U.S. cybersecurity firm FireEye discloses breach, theft of internal hacking tools

    (Reuters) - FireEye, one of the largest cybersecurity companies in the United States, said on Tuesday that is has been hacked, possibly by a government, leading to the theft of an arsenal of internal hacking tools typically reserved to privately test the cyber defenses of their own clients..."

    https://finance.yahoo.com/news/u-cybersecurity-firm-fireeye-discloses-210424354.html
     
  3. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,130
    Location:
    DC Metro Area
    "Top cybersecurity firm FireEye says it was hit by state-sponsored cyberattack...

    In an investor disclosure, FireEye said the attack was highly customized to target FireEye's systems and is unlike any the company has responded to in the past.

    'Based on his 25 years in cyber security and responding to incidents, Kevin Mandia, our Chief Executive Officer, concluded we are witnessing an attack by a nation with top-tier offensive capabilities,' the SEC filing said.

    The attacker accessed 'certain Red Team assessment tools that we use to test our customers' security,'the disclosure continued, implying that many of FireEye's clients, including its government customers, could be indirectly affected by the breach. 'We are proactively releasing methods and means to detect the use of our stolen Red Team tools...

    we have developed more than 300 countermeasures for our customers, and the community at large, to use in order to minimize the potential impact of the theft of these tools'..."

    https://www.cnn.com/2020/12/08/tech/fireeye-cyberattack/index.html
     
    Last edited: Dec 8, 2020
  4. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,130
    Location:
    DC Metro Area
  5. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,130
    Location:
    DC Metro Area
  6. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,130
    Location:
    DC Metro Area
  7. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,130
    Location:
    DC Metro Area
  8. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,130
    Location:
    DC Metro Area
    "Hack of top American cybersecurity firm linked to Russia’s foreign intelligence service [The SVR]...

    The same Russian spies who penetrated the White House and State Department several years ago and have attempted to steal coronavirus vaccine research have carried off another brazen hack, this time breaking into the servers of one of the world’s premier cybersecurity firms...

    The SVR...hacks for traditional espionage purposes, stealing secrets that can be useful for the Kremlin to understand the plans and motives of politicians and policymakers. Its operators have filched industrial secrets, hacked foreign ministries and gone after coronavirus vaccine data..."

    https://www.washingtonpost.com/nati...369aaa-3988-11eb-98c4-25dc9f4987e8_story.html
     
  9. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    178,169
    Location:
    Texas
  10. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    https://www.politico.com/news/2020/12/16/russian-hackers-fireeye-cyberattack-447226

    You know what I don't get? You would think that an EDR system would notice such an attack, that's exactly what they are designed for. They monitor and block suspicious stuff that AV's fail to spot.

    Even when SolarWinds is a trusted tool, you would hope it's still being monitored for suspicious file and network access for example. But I don't know the details about the SolarWinds backdoor, but don't forget it also happened to CCleaner.

    https://www.gartner.com/reviews/market/endpoint-detection-and-response-solutions
    https://threatpost.com/inside-the-ccleaner-backdoor-attack/128283/
     
  11. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Here is an interesing article about how security companies might be an attractive investment option. But then they should really do a better job, they should focus more on supply chain attacks, if you ask me.

    https://www.barrons.com/articles/wa...ing-solarwinds-hack-51608586159?siteid=yhoof2
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice