FireEye Network Breach Case Study | 2Secure Corp

Table of Contents

YouTube video

Yigal Behar, host of The Cybersecurity Insider podcast, dives into the latest cybersecurity news. He begins by discussing the alarming rise in ransomware attacks. 

Citing recent news, he notes the widespread impact, noting that even government bodies and other organizations have fallen victim to this malicious software.

Shirbit Attacks

Yigal continues to recount the escalating cybersecurity threats. Last week, he reveals, an Israeli insurance company named Shirbit fell victim to a ransomware attack.

On December 8, 2020, a hacker group named Black Shadow attacked Shirbit. They managed to break into the company’s systems and steal a lot of sensitive information. The hackers demanded a ransom of almost $1 million from Shirbit. They threatened to release the stolen data if the company didn’t pay (ref).

Yigal says that the danger extends beyond the immediate impact of the ransom demand. Hackers can also exploit such breaches to extract sensitive information from the network, potentially using it to fuel future attacks.

FireEye Network Breach

In a startling turn of events, Yigal reveals that FireEye, the renowned cybersecurity firm, has itself become a target. Just yesterday, the company confirmed on its website that it had suffered a major cyber attack. 

The CEO, in a statement, attributed the attack to a nation-state actor. The implications of this breach are vast, given FireEye’s roster of high-profile clients. It is speculated that the attacker’s motives extend beyond mere information theft. 

In response to the breach, FireEye is taking proactive measures. They are revising their toolsets, particularly their detection tools, to identify any unauthorized use of their penetration testing tools. 

Red Teaming

Yigal explains the FireEye breach, talking about the concept of “red teaming.” These tools, designed for ethical hacking and penetration testing, have now fallen into the wrong hands. Adversaries, equipped with FireEye’s own tools, can create a smokescreen, attributing malicious activities to legitimate FireEye operations. 

This tactic, Yigal warns, can seriously hinder investigations into network breaches, adding that “it’s a way how to disrupt an investigation of a network breach.”

The Ripple Effect

Yigal says the FireEye breach has far-reaching consequences for everyone because it can affect other companies too (impact on the supply chain). By compromising FireEye, attackers gain access to not only the company’s tools but also sensitive customer data. However, the danger doesn’t stop there. 

These sophisticated adversaries are likely interested in the intelligence FireEye gathers, their methodologies for collecting it, and how they use it to inform security decisions and monitor customer activity. Yigal warns that this information could enable attackers to evade detection and undermine security measures implemented by FireEye and its clients.

According to Yigal, cyberattacks are getting harder to spot, especially those that go after the supply chain. Attackers don’t attack the main target directly anymore. They go after other companies connected to it. 

This way, the main target doesn’t know they are being attacked. It’s like a sneak attack, where the attackers can gather information and get into the main target’s network without being noticed. Yigal says this type of attack is happening more and more often.

Nation-State Attacks Are A Growing Threat

Yigal shares a disturbing trend in cyberattacks. In 2019 alone, he states, out of 69 recorded cases, a whopping 37 were attributed to nation-state actors. These sophisticated attackers, he explains, target various entities with the primary goal of collecting information. 

This information is then weaponized and used to orchestrate further attacks on other targets. Yigal points out that this trend of nation-state-sponsored cyber espionage is a growing concern in the cybersecurity industry.

Don’t miss out on the latest cybersecurity news and analysis! Subscribe to The Cybersecurity Insider podcast. Watch for more informative videos on our YouTube channel and join the conversation on Apple Podcasts and Spotify.

Share this article with a friend

Related Posts

Securing Your Business Against The Threats Of Quantum Computing

Securing Your Business Against The Threats Of Quantum Computing

One potential danger on the horizon is the advent of quantum computing, which could pose a serious risk to the…
10 Steps To Build Cyber Resilience For Your Company

10 Steps To Build Cyber Resilience For Your Company

Cyber risks come in many forms and can target different parts of your operations. Knowing where your vulnerabilities lie can…
How Middleware Improves Business Security

How Middleware Improves Business Security

Middleware is software that connects different applications, databases, or other systems to allow them to communicate and interact with each…

Sign Up for Your Free 30-Day SoC Trial Today!

We Are Now Offering Our 24/7 SoC Service With a Risk-Free 30-Day Trial—No Commitments Required.

Hurry! Limited Slots Available for This Exclusive Trial.

Ground Rules

  1. 🏢 Minimum Company Size: Must have at least 25 employees.
  2. 💻 Endpoints Limit: Trial is limited to a specific number of endpoints.
  3. One Trial Per Company: You can’t trial more than once.

What You’ll Get During the Trial

  1. 🎁 $150 Amazon Gift Card: Just for signing up.
  2. 👩‍💻 24/7 SoC Team: Our experts monitoring your environment so you can sleep easy.
  3. 🔍 Threat Hunting: Uncover existing threats hiding in your network.
  4. ⚠️ Active Threat Detection:
    • Detect unknown active threats.
    • Detect known active threats.
  5. 🔧 Missing Patch Identification: Stay on top of vulnerabilities caused by unpatched systems.
  6. Free Internal Vulnerability Assessment:
    At the end of your trial, you’ll receive a complimentary assessment to know exactly where you stand.

Test Drive 2Secure

Create an account to access this functionality.
Discover the advantages