Mandiant is investigating hacks in efforts to better their research
Mandiant, the company behind the big research report we talked about on APT1, is now asking for people to talk about their hacking episodes they’ve been affected with. They’re trying to be the go-to investigators, it seems, for the Fortune 1000.
When trying for importance, first of all, let your work speak for yourself instead of trying so hard and stating your intents. Anyway, back on topic…When the New York Times was hacked back in late 2012, phone calls were made to Mandiant. When Mandiant investigated this issue, reports were shown that the hacks were coming from a hidden firm in the Chinese military, called APT1.
A 60-page report (PDF), which was created by Mandiant, detailed the issues behind cyber-espionage group APT1. The New York Times detailed all about APT1 as well (which summarized some info in the 60-pg. report), and by rights done so out of anger/reply against the crime group.
One of the surprising aspects of the report, is that APT1 practiced spearphishing attacks on the NYT, but what were they targeting? A big organization with big media possibilities. That’s the point in spearphishing.
Mandiant’s data forensic capabilities are stepping it up, and now they want to know about your hacks that have been experienced. They’re looking to investigate more of the issues behind some of the hacks. They want to target the organizations, whomever they are, that are behind these small-to-large scale attacks.
Check out this video from Mandiant:
Some of Mandiant’s operations can be read on their annual report.
This proves that the investigations are continuing in trial for the cyberwars that are going on around the world. It’s still continuing, and even stepped up in some means.
Feel free to comment on this story below.
Tags: APT1, China, Cyber spying, hackers, Mandiant, New York Times, United States
About Dr Jay
MarketerRecent Posts
Topics
Popular Tags
Adobe Adobe Flash Player Adobe Reader Android Anonymous Anti-Virus AntiVirus Apple Barack Obama Botnet Business Computer security Cross-site scripting Cybercrime Cyberwar Data leakage Denial-of-service attack exploit Exploits Facebook Federal Bureau of Investigation Firefox Flame Flash Player Google Google Chrome hackers hacks Identity theft Intel Internet Explorer IOS Iran Israel Java Kaspersky Lab Linux LulzSec Mac OS X Malicious Software Malware Microsoft Microsoft Security Essentials Microsoft Windows Mozilla Firefox New York Times Oracle Password Patch Tuesday Personally identifiable information Phishing Privacy Rogue security software rootkit Scam Security Shamoon SMS Social network Spam SQL injection Stuxnet Symantec Twitter United States United States Department of Homeland Security Virtual machine Vulnerabilities Vulnerability Vulnerability management Web browser Windows Windows 7 Windows 8 Windows UpdateBlogroll
- GFI Labs Blog
- SecuraGeek Forums
- Delete Malware
- Dancho Danchev's blog
- Schneier on Security
- Crowdstrike Blog
- FireEye Blog
- evilfantasy's Blog
- F-Secure Weblog
- TaoSecurity Blog
- Fortinet FortiBlog
- Kafeine's Malware Don't Need Coffee
- Cyveillance Blog
- Xylitol's Xylibox Blog
- Lookout Mobile Security Blog
- SWW Blog
- Lavasoft Security Blog
- Wired ThreatLevel Blog
- AVG Blogs
- Dynamoo's Blog
- Security Battlefield with George Kurtz
- Slug Analysis Lab
- DSL Reports Sec. Forum
- SANS Internet Storm Center
- Bart Blaze's Security Blog
- McAfee Labs Blog
- avast! blog
- SecureList Blog by Kaspersky
- Emsisoft Anti-Malware Blog
- Arbor Networks
- Unmask Parasites
- Krebs on Security
- Damballa Press Center
- S!Ri.URZ Blog
- hpHosts Blog
- Bill Mullins Weblog
- ThreatPost
- SANS Securing The Human Blog
- Microsoft Malware Protection Center Blog
- Google Online Security Blog
- DHS Daily Report (Homeland-Sec)
- Webroot Blog
- Web of Trust Blog
- We Live Security (ESET)
- Tigzy's RogueKiller Blog
- US-CERT Computer Emergency Response Team
- Bleeping Computer Virus, Spyware, & Malware Removal Guides
- Security Affairs
- Stop Badware Blog
- Contagio Malware Dump
Trackbacks / Pingbacks