Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MILPITAS, CA -- (Marketwired) -- 08/21/13 -- FireEye, Inc., the leader in stopping today's new breed of cyber attacks, today announced the release of a report titled, "Poison Ivy: Assessing Damage and Extracting Intelligence," that highlights the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release -- attacking dozens of Fortune 1000 firms. In conjunction with the research, FireEye is also releasing Calamine, a set of free tools to help organizations detect possible Poison Ivy infections.
"Remote access tools may be the hacker's equivalent of training wheels," said Darien Kindlund, manager of threat intelligence at FireEye. "But dismissing this common breed of malware could be a costly mistake. Despite their reputation as a software toy for novice attackers -- RATs remain a linchpin of many sophisticated cyber attacks and are used by numerous threat actors. Today, we see hundreds of attacks using Poison Ivy targeting very high profile enterprises."
Poison Ivy has been used in several high-profile malware campaigns, most famously, the 2011 compromise of RSA SecurID data. In the same year, Poison Ivy powered a coordinated attack dubbed "Nitro" against chemical makers, government offices, defense firms, and human rights groups.
The FireEye report identifies several ongoing nation-state threat actors currently using Poison Ivy, including:
With the Calamine package, security professionals can identify telltale indicators of a Poison Ivy attack -- including the attacker's Poison Ivy process mutex and password, decoded command and control traffic to identify exfiltration/lateral movement, and a timeline of Poison Ivy malware activity. The FireEye report explains how Calamine can connect these and other facets of the attack.
This evidence is especially useful when it is correlated with multiple attacks that display the same identifying features. Combining these granular details with big-picture intelligence can help profile threat attackers and enhance IT defenses.
To download the full report, please visit http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf.
To see the blog summary: http://www.fireeye.com/blog/technical/targeted-attack/2013/08/pivy-assessing-damage-and-extracting-intel.html.
To participate in a FireEye Labs webinar explaining Poison Ivy and how to detect it, please visit http://www2.fireeye.com/combatting-poison-ivy-attacks.html.
About FireEye, Inc.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, email, and files and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,000 customers across more than 40 countries, including over 100 of the Fortune 500.
© 2013 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Media Contact
Katherine Nellums
LEWIS PR
+1.415.432.2451
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs