Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-10-14FireEyeAndrew Moore, Genevieve Stark, Jacqueline O’Leary, Kimberly Goody, Nalani Fraser, Vincent Cannon
FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data Theft
FIN11
2020-10-14FireEyeAndrew Moore, Genevieve Stark, Jacqueline O’Leary, Kimberly Goody, Nalani Fraser, Vincent Cannon
FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data Theft
FIN11
2020-10-14FireEyeAndrew Moore, Genevieve Stark, Jacqueline O’Leary, Kimberly Goody, Nalani Fraser, Vincent Cannon
FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data Theft
FIN11
2020-08-11FireEyeAlex Pennino, Brendan McKeague, Harris Ansari, Nick Schroeder, Tim Martin
COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
2020-08-11FireEyeAlex Pennino, Brendan McKeague, Harris Ansari, Nick Schroeder, Tim Martin
COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
2020-08-11FireEyeAlex Pennino, Brendan McKeague, Harris Ansari, Nick Schroeder, Tim Martin
COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
2020-08-11FireEyeAlex Pennino, Brendan McKeague, Harris Ansari, Nick Schroeder, Tim Martin
COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
2020-08-11FireEyeAlex Pennino, Brendan McKeague, Harris Ansari, Nick Schroeder, Tim Martin
COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
2020-08-06FireEyeNhan Huynh
Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle Approach
MASS Logger
2020-07-30FireEyeJoseph Hladik, Josh Fleischer
Obscured by Clouds: Insights into Office 365 Attacks and How Mandiant Managed Defense Investigates
2020-07-30FireEyeJoseph Hladik, Josh Fleischer
Obscured by Clouds: Insights into Office 365 Attacks and How Mandiant Managed Defense Investigates
2020-07-29FireEyeDavid Mainor, Gabby Roncone, Lee Foster, Sam Riddell
'Ghostwriter' Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned With Russian Security Interests
Ghostwriter
2020-07-29FireEyeDavid Mainor, Gabby Roncone, Lee Foster, Sam Riddell
'Ghostwriter' Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned With Russian Security Interests
Ghostwriter
2020-07-29FireEyeDavid Mainor, Gabby Roncone, Lee Foster, Sam Riddell
'Ghostwriter' Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned With Russian Security Interests
Ghostwriter
2020-07-29FireEyeDavid Mainor, Gabby Roncone, Lee Foster, Sam Riddell
'Ghostwriter' Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned With Russian Security Interests
Ghostwriter
2020-07-13FireEyeAaron Stephens, Andrew Thompson
SCANdalous! (External Detection Using Network Scan Data and Automation)
POWERTON QUADAGENT PoshC2
2020-07-13FireEyeAaron Stephens, Andrew Thompson
SCANdalous! (External Detection Using Network Scan Data and Automation)
POWERTON QUADAGENT PoshC2
2020-07-07FireEyeMatthew Haigh, Trevor Haskell
Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement Tool
2020-07-07FireEyeMatthew Haigh, Trevor Haskell
Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement Tool
2020-05-21BrightTALK (FireEye)Jeremy Kennelly, Kimberly Goody
Navigating MAZE: Analysis of a Rising Ransomware Threat
Maze