Quantcast
Channel: FireEye Blog » Sai Omkar Vashisht
Browsing all 4 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

More Insights on the Recent Korean Cyber Attacks (Trojan.Hastati)

It is interesting to see how this malware attack in Korea focuses on wiping and destruction rather than information or data stealing. This attack is as much a cyber rampage as it is a cyber attack. In...

View Article


Image may be NSFW.
Clik here to view.

Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method

Recently, we discovered a new IE zero-day exploit in the wild, which has been used in a strategic Web compromise. Specifically, the attackers inserted this zero-day exploit into a strategically...

View Article


Image may be NSFW.
Clik here to view.

Turing Test in Reverse: New Sandbox-Evasion Techniques Seek Human Interaction

Last year, we published a paper titled Hot Knives Through Butter, Evading File-Based Sandboxes.  In this paper, we explained many sandbox evasion methods–and today’s blog post adds to our growing...

View Article

Image may be NSFW.
Clik here to view.

The Path to Mass-Producing Cyber Attacks

Lines of people, lines of parts. The modern production line is composed of individuals contributing to a larger process. This common manufacturing approach is efficient, effective, and profitable. Now...

View Article
Browsing all 4 articles
Browse latest View live