FireEye’s network testing tools were stolen – now what?

This week’s admission by FireEye that a suspected nation-state made off with so-called red team test tools it uses to probe customers’ networks for vulnerabilities has made some infosec pros uneasy.

On the one hand, as many experts quickly noted, this wasn’t like the 2017 Shadow Brokers hack of the NSA which publicly revealed secret software exploits the U.S. intelligence agency used to break into targets. FireEye describes the stolen goods as ranging from “simple scripts used for automating reconnaissance to entire frameworks that are similar to publicly available technologies such as CobaltStrike and Metasploit.”

Many of the tools have already been released to the infosec community, it added. FireEye quickly released what it says are hundreds of countermeasures and signatures…


Source link

About coldfusion

Check Also

Obama chief scientist cools on climate crisis news coverage

Article originally published at CFACT.org President Barack Obama’s Energy Department Chief Scientist Steven Koonin’s soon-to-be-published …

Leave a Reply

Your email address will not be published. Required fields are marked *