FireEye’s network testing tools were stolen – now what?

This week’s admission by FireEye that a suspected nation-state made off with so-called red team test tools it uses to probe customers’ networks for vulnerabilities has made some infosec pros uneasy.

On the one hand, as many experts quickly noted, this wasn’t like the 2017 Shadow Brokers hack of the NSA which publicly revealed secret software exploits the U.S. intelligence agency used to break into targets. FireEye describes the stolen goods as ranging from “simple scripts used for automating reconnaissance to entire frameworks that are similar to publicly available technologies such as CobaltStrike and Metasploit.”

Many of the tools have already been released to the infosec community, it added. FireEye quickly released what it says are hundreds of countermeasures and signatures…

Source link

About coldfusion

Check Also

Riverhead green-lights EPCAL drag racing events for 2022

Drag racing at the Calverton Enterprise Park got a green light for 2022 from the …

Leave a Reply

Your email address will not be published. Required fields are marked *