Skip to content

Cyberattack on FireEye leaves unresolved queries in its wake

Potential vulnerabilities in FireEye's security infrastructure may permit cyber-assaults on the firms they safeguard, potentially causing severe supply chain attacks, according to experts.

Unresolved Cyberattack on FireEye Yields More Enigmas Than Clarifications
Unresolved Cyberattack on FireEye Yields More Enigmas Than Clarifications

Cyberattack on FireEye leaves unresolved queries in its wake

FireEye, a leading global cybersecurity company, announced a cybersecurity attack on its systems on Tuesday. In a blog post, FireEye's CEO Kevin Mandia revealed that the attack targeted and accessed Red Team tools used by the company for diagnostic security.

The nature of the cybersecurity attack is still under investigation, but it is believed to be the work of a sophisticated actor using a novel technique. The exact method used to compromise the tools remains unclear.

FireEye has not disclosed how it determined a cybersecurity attack took place, but the company has assured its customers that it has seen no evidence that customer data was exfiltrated. The investigation is ongoing to determine if customer data was compromised.

The cybersecurity attack on FireEye could potentially lead to devastating supply chain attacks, as if attackers found a weakness in FireEye's defenses, it could allow attacks against companies under its protection. FireEye's customers have been advised to check their logs for indicators of compromise behind the attack.

FireEye has 9,600 customers, including 1,000 customers from government and law enforcement agencies worldwide. The firm's consulting arm, Mandiant, works directly with companies to hone defenses.

The concern is that FireEye may be withholding information about a zero-day vulnerability before it can be patched. This raises questions about trust when cybersecurity firms, tasked with protecting customers, are impacted.

Experts have commended FireEye for its early response and collaboration with stakeholders, including the FBI and Microsoft. The New York Times report suggests the attack perpetrators are "almost certainly Russian," but FireEye has not attributed the cybersecurity attack to a specific nation state.

Cybersecurity companies, including Bit9, Kaspersky, Symantec, Trend Micro, and RSA (in 2011), have been compromised in the past. Mike Wiacek, CEO of cybersecurity startup Stairwell Inc, compares the investigation to finding out that the main target was a masterpiece, not just a gift shop item.

The cybersecurity attack on FireEye is suspected to have been carried out by a nation-state actor linked to the SolarWinds incident, which multiple sources including FireEye and Microsoft reported in December 2020. However, the specific nation(s) behind the cybersecurity attack are not explicitly mentioned in the provided search results.

FireEye is a major cybersecurity company with 3,000 employees operating globally and $899 million in revenue in 2019. The company's ongoing investigation is a reminder of the ever-evolving threat landscape in the digital world and the importance of vigilance and collaboration in the face of cyber threats.

Read also:

Latest

Exploration

Investigation

Dongfeng unveils innovative plans, with the Wuhan-based team bringing fresh creativity to the table. Their updated lineup showcases joint venture machines.

Investigation

Investigation

Revamped Brilliance BS4 Crossover Wagon Showcased at Beijing Auto Show; Notably, its design underwent the most transformation.