Jump to content

Trellix: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Bendodge (talk | contribs)
Added Advert template
m Removing Commons category (Category:Trellix) as it does not exist
 
(42 intermediate revisions by 35 users not shown)
Line 1: Line 1:
{{Advert|date=August 2022}}
{{short description|American cybersecurity company}}
{{short description|American cybersecurity company}}
{{about|the cyber security company|the defunct web hosting company|Trellix (1995–2004)}}
{{about|the cyber security company|the defunct web hosting company|Trellix (1995–2004)}}
{{Advert|date=August 2022}}
{{Use mdy dates|date=October 2019}}
{{Use mdy dates|date=October 2019}}
{{Use American English|date=September 2022}}
{{Infobox company
{{Infobox company
| name = Trellix
| name = Trellix
| logo = Trellix Logo.svg
| logo = Trellix Logo.svg
| type = Private
| type = [[Privately held company|Private]]
| foundation = 2022
| foundation = {{start date and age|2022}}
| founder =
| founder =
| location = [[Milpitas, California|Milpitas]], [[California]], [[United States]]
| location = [[Milpitas, California|Milpitas]], [[California]], [[United States]]
| locations =
| locations =
| area_served =
| area_served =
| key_people = Bryan Palma, CEO
| key_people = Bryan Palma ([[Chief executive officer|CEO]])
| industry = [[Computer security]]
| industry = [[Computer security]]
| products = Cyber Security Hardware and Software {{unbulleted list| Email Security | Endpoint Security | File Security | Cross Vendor Management Interface}}
| products = Cyber Security Hardware and Software {{unbulleted list| Email Security | Endpoint Security | File Security | Cross Vendor Management Interface}}
| services = IT security Consulting Services {{unbulleted list| Incident Response | Vulnerability Testing | Preparedness Assessment}}
| services = IT Security Consulting Services {{unbulleted list| Incident Response | Vulnerability Testing | Preparedness Assessment}}
| revenue = {{increase}} {{US$|940 million|link=yes}} {{small|(2020)<ref name="10-K">{{cite web | url = https://last10k.com/sec-filings/feye#link_fullReport | title = FireEye, Inc. 2020 Annual Report (Form 10-K) | date = February 2021 | publisher = [[U.S. Securities and Exchange Commission]] | website = last10k.com}}</ref>}}
| revenue = {{increase}} {{US$|940 million|link=yes}} {{small|(2020)<ref name="10-K">{{cite web | url = https://last10k.com/sec-filings/feye#link_fullReport | title = FireEye, Inc. 2020 Annual Report (Form 10-K) | date = February 2021 | publisher = [[U.S. Securities and Exchange Commission]] | website = last10k.com}}</ref>}}
| assets = {{increase}} {{US$|3.245 billion}} {{small|(2020)<ref name="10-K" />}}
| assets = {{increase}} {{US$|3.245 billion}} {{small|(2020)<ref name="10-K" />}}
Line 23: Line 24:
| divisions =
| divisions =
| subsid =
| subsid =
| homepage = {{url|https://www.trellix.com/}}
| homepage = {{URL|https://trellix.com/}}
| footnotes =
| footnotes =
| intl =
| intl =
}}
}}
'''Trellix''' (formerly '''FireEye''' and '''McAfee Enterprise''') is a privately held cybersecurity company founded in 2022. It has been involved in the detection and prevention of major cyber attacks.
'''Trellix''' (formerly '''FireEye''' and '''McAfee Enterprise''') is a privately held [[Computer security|cybersecurity]] company that was founded in 2022. It has been involved in the detection and prevention of major cybersecurity attacks.
It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks.<ref name="Springer 2017 p. 109">{{cite book | last = Springer | first = P.J. | title = Encyclopedia of Cyber Warfare | publisher = ABC-CLIO | year = 2017 | isbn = 978-1-4408-4425-6 | url = https://books.google.com/books?id=9tgoDwAAQBAJ&pg=PA109 | access-date=September 18, 2018 | page = 109}}</ref>
It provides hardware, software, and services to investigate cybersecurity attacks, protect against [[Malware|malicious software]], and analyze IT security risks.<ref name="Springer 2017 p. 109">{{cite book | last = Springer | first = P.J. | title = Encyclopedia of Cyber Warfare | publisher = ABC-CLIO | year = 2017 | isbn = 978-1-4408-4425-6 | url = https://books.google.com/books?id=9tgoDwAAQBAJ&pg=PA109 | access-date=September 18, 2018 | page = 109}}</ref>


In March 2021, STG announced its acquisition of McAfee Enterprise in an all-cash transaction for $4.0 billion.<ref name="MFE Announcement">{{cite web | title=McAfee Announces Sale of Enterprise Business to Symphony Technology Group for $4.0 Billion | url=https://stgpartners.com/2021/03/08/mcafee-announces-sale-of-enterprise-business-to-symphony-technology-group-for-4-0-billion/ | website=stgpartners.com| access-date=April 20, 2022}}</ref> STG completed the acquisition of McAfee’s Enterprise business in July 2021 with plans for re-branding.<ref name="MFE Closure">{{cite web | title=Symphony Technology Group Closes Acquisition of McAfee's Enterprise Business | url=https://stgpartners.com/2021/07/27/symphony-technology-group-closes-acquisition-of-mcafees-enterprise-business/ | website=stgpartners.com| access-date=April 20, 2022}}</ref> In June 2021, FireEye sold its name and products business to [[Symphony Technology Group]] (STG) for $1.2 billion.<ref name="selling"/> STG combined FireEye with its acquisition of [[McAfee]]'s enterprise business to launch Trellix, an [[extended detection and response]] (XDR) company.<ref name="combined">{{cite web |title=McAfee Enterprise and FireEye combo is now Trellix |url=https://www.itworldcanada.com/article/mcafee-enterprise-and-fireeye-combo-is-now-trellix/471609 |website=itworldcanada.com |access-date=February 8, 2022}}</ref> Meanwhile, McAfee Enterprise's security service edge (SSE) business would operate as a separate company to be known as Skyhigh Security.<ref>{{cite web |title=McAfee Enterprise cloud security biz relaunches as Skyhigh |url=https://venturebeat.com/2022/03/21/mcafee-enterprise-cloud-security-biz-relaunches-as-skyhigh/ |website=venturebeat.com |access-date=July 12, 2022}}</ref>
In March 2021, [[Symphony Technology Group]] (STG) announced its acquisition of McAfee Enterprise in an all-cash transaction for US$4.0 billion.<ref name="MFE Announcement">{{cite web | title=McAfee Announces Sale of Enterprise Business to Symphony Technology Group for $4.0 Billion | url=https://stgpartners.com/2021/03/08/mcafee-announces-sale-of-enterprise-business-to-symphony-technology-group-for-4-0-billion/ | website=stgpartners.com| date=March 8, 2021 | access-date=April 20, 2022}}</ref> STG completed the acquisition of McAfee’s Enterprise business in July 2021 with plans for re-branding.<ref name="MFE Closure">{{cite web | title=Symphony Technology Group Closes Acquisition of McAfee's Enterprise Business | url=https://stgpartners.com/2021/07/27/symphony-technology-group-closes-acquisition-of-mcafees-enterprise-business/ | website=stgpartners.com| date=July 28, 2021 | access-date=April 20, 2022}}</ref> In June 2021, FireEye sold its name and products business to STG for $1.2bn.<ref name="selling">{{cite web |title=FireEye is selling its products business and name for $1.2 billion |url=https://www.cnbc.com/2021/06/02/fireeye-selling-products-business-and-name-for-1point2-billion.html |access-date=February 8, 2022 |website=cnbc.com|date=June 2, 2021 }}</ref> STG combined FireEye with its acquisition of [[McAfee]]'s enterprise business to launch Trellix, an [[extended detection and response]] (XDR) company.<ref name="combined">{{cite web |title=McAfee Enterprise and FireEye combo is now Trellix |url=https://www.itworldcanada.com/article/mcafee-enterprise-and-fireeye-combo-is-now-trellix/471609 |website=itworldcanada.com |date=January 27, 2022 |access-date=February 8, 2022}}</ref> Meanwhile, McAfee Enterprise's security service edge (SSE) business would operate as a separate company to be known as [[Skyhigh Security]].<ref>{{cite web |title=McAfee Enterprise cloud security biz relaunches as Skyhigh |url=https://venturebeat.com/2022/03/21/mcafee-enterprise-cloud-security-biz-relaunches-as-skyhigh/ |website=venturebeat.com |date=March 22, 2022 |access-date=July 12, 2022}}</ref>


==History==
==History==


FireEye was founded in 2004 by [[Ashar Aziz]], a former [[Sun Microsystems]] engineer.<ref name="Springer 2017 p. 109" /><ref name="Anderson 2018">{{cite news | last = Anderson | first = Mae | title = FireEye is tech firms' weapon against disinformation, staffed with 'the Navy SEALs of cyber security' | newspaper = latimes.com | date = August 24, 2018 | url = https://www.latimes.com/business/technology/la-fi-tn-fireeye-20180824-story.html | access-date=September 18, 2018}}</ref> FireEye's first commercial product was not developed and sold until 2010.<ref name="USA TODAY 2013">{{cite web | title = FireEye shares double as hot security firm goes public | website = USA TODAY | date = September 20, 2013 | url = https://www.usatoday.com/story/cybertruth/2013/09/24/fireeye-shares-double-as-security-firm-goes-public/2844227/ | access-date=September 22, 2018}}</ref> That same year, FireEye expanded into the Middle East.<ref name="ITP.net">{{cite web | title = FireEye Inc steps into the Middle East | website = ITP.net | url = http://www.itp.net/583119-fireeye-inc-steps-into-the-middle-east | first = Georgina | last = Enzer | access-date = September 18, 2018}}</ref> This was followed by the opening of new offices in Asia Pacific in 2010,<ref name="CSO 2018">{{cite web | title = Security Watch: FireEye appoints first ever Asia Pac president | website = CSO | date = November 15, 2018 | url = https://www.cso.com.au/article/571608/fireeye-appoints-first-ever-asia-pac-president/ | access-date=November 15, 2018}}</ref> Europe in 2011<ref name="IT PRO 2011">{{cite web | title = FireEye looks to break into UK | website = IT PRO | date = March 17, 2011 | url = http://itpro.co.uk/go/14826 | access-date=September 18, 2018 | first = Tom | last = Brewster}}</ref> and Africa in 2013.<ref name="Doyle 2013">{{cite web | last = Doyle | first = Kirsten | title = FireEye opens local office | website = ITWeb | date = August 7, 2013 | url = https://www.itweb.co.za/content/okYbe9MX51jqAWpG | access-date=September 22, 2018}}</ref>
FireEye was founded in 2004 by [[Ashar Aziz]], a former [[Sun Microsystems]] engineer.<ref name="Springer 2017 p. 109" /><ref name="Anderson 2018">{{cite news | last = Anderson | first = Mae | title = FireEye is tech firms' weapon against disinformation, staffed with 'the Navy SEALs of cyber security' | newspaper = latimes.com | date = August 24, 2018 | url = https://www.latimes.com/business/technology/la-fi-tn-fireeye-20180824-story.html | access-date=September 18, 2018}}</ref>
FireEye's first commercial product was not developed and sold until 2010.<ref name="USA TODAY 2013">{{cite web | title = FireEye shares double as hot security firm goes public | website = USA TODAY | date = September 20, 2013 | url = https://www.usatoday.com/story/cybertruth/2013/09/24/fireeye-shares-double-as-security-firm-goes-public/2844227/ | access-date=September 22, 2018}}</ref> Initially, FireEye focused on developing [[virtual machine]]s to download and test [[internet traffic]] before transferring it to a corporate or government [[Computer network|network]].


In December 2012, founder Aziz stepped down as [[Chief executive officer|CEO]] and former [[McAfee]] CEO David DeWalt was appointed to the position<ref name="Fortune 2016">{{cite web | title = FireEye Names New CEO | website = Fortune | date = May 6, 2016 | url = http://fortune.com/2016/05/06/fireeye-ceo-rumors/ | access-date=September 18, 2018 | first = Robert | last = Hackett}}</ref><ref name="Owens Delevett 2013">{{cite news | last1 = Owens | first1 = Jeremy C. | last2 = Delevett | first2 = Peter | title = FireEye's price more than doubles on Wall Street after eye-popping IPO | newspaper = [[The Mercury News]] | date = September 20, 2013 | url = https://www.mercurynews.com/2013/09/20/fireeyes-price-more-than-doubles-on-wall-street-after-eye-popping-ipo-2/ | access-date=September 22, 2018}}</ref><ref name="Reuters">{{cite web | title = FireEye names former McAfee exec Dave DeWalt as CEO, plans IPO | website = Reuters | date = November 28, 2012 | url = https://www.reuters.com/article/fireeye-ceo/fireeye-names-former-mcafee-exec-dave-dewalt-as-ceo-plans-ipo-idUSL1E8MSA7R20121128 | access-date=September 18, 2018}}</ref> to prepare the company for an [[initial public offering]] (IPO).<ref name="USA TODAY 2013" /><ref name="Kelly 2013">{{cite web | last = Kelly | first = Meghan | title = FireEye brings more legitimacy to new security solutions with IPO filing | website = VentureBeat | date = August 5, 2013 | url = https://venturebeat.com/2013/08/05/fireeye-ipo/ | access-date=September 22, 2018}}</ref> The following year, FireEye raised an additional $50 million in [[venture capital]], bringing its total funding to $85M.<ref name="Westervelt 2013">{{cite web | last = Westervelt | first = Robert | title = FireEye Scores $50M Funding, Beefs Up Executive Team | website = CRN | date = January 10, 2013 | url = https://www.crn.com/news/security/240146043/fireeye-scores-50m-funding-beefs-up-executive-team.htm | access-date=September 22, 2018}}</ref><ref name="Bort 2013">{{cite web | last = Bort | first = Julie | title = Now Worth $1.25 Billion, FireEye Is The Next Hot Enterprise Startup To Watch | website = Business Insider | date = January 10, 2013 | url = https://www.businessinsider.com/fireeye-fundraising-2013-1 | access-date=September 22, 2018}}</ref> In late 2013, FireEye went public, raising $300M.<ref name="Owens Delevett 2013"/> FireEye remained public until 2021.<ref name="selling" />
Initially, FireEye focused on developing virtual machines to download and test internet traffic before transferring it to a corporate or government network. The company diversified over time, in part through acquisitions. In 2014, it acquired Mandiant, which provides incident response services following the identification of a security breach. FireEye went public in 2013, and remained so until 2021.<ref name="selling">{{cite web |title=FireEye is selling its products business and name for $1.2 billion |url=https://www.cnbc.com/2021/06/02/fireeye-selling-products-business-and-name-for-1point2-billion.html |website=cnbc.com |access-date=February 8, 2022}}</ref> ''[[USAToday]]'' says FireEye "has been called in to investigate high-profile attacks against Target, JP Morgan Chase, Sony Pictures, Anthem, and others".<ref>{{cite web | title = FireEye has become Go-to Company for Breaches | url = https://www.usatoday.com/story/tech/2015/05/20/fireeye-mandiant-carefirst/27659481/ | website = USA Today | access-date = May 21, 2015}}</ref>


In December 2013, FireEye acquired [[Mandiant]] for $1bn.<ref name="The New York Times 2014">{{cite web | first1 = Nicole | last1 = Perlroth | first2 = David | last2 = Sanger | title = FireEye Computer Security Firm Acquires Mandiant | website = The New York Times | date = January 3, 2014 | url = https://www.nytimes.com/2014/01/03/technology/fireeye-computer-security-firm-acquires-mandiant.html | access-date=September 18, 2018}}</ref> Mandiant was a private company founded in 2004 by Kevin Mandia that provided [[Incident management|incident response services]] in the event of a [[Data breach|data security breach]].<ref name="The New York Times 2014" /><ref name="Reuters 2014">{{cite web | agency = Reuters | title = FireEye Buys Mandiant For $1 Billion In Huge Cyber Security Merger | website = Business Insider | date = January 2, 2014 | url = https://www.businessinsider.com/fireeye-buys-mandiant-for-1-billion-2014-1 | access-date=September 22, 2018}}</ref> Mandiant was known for investigating high-profile [[Hacker group|hacking groups]].<ref name="The New York Times 2014" /> Before the acquisition, FireEye would often identify a security breach, then partner with Mandiant to investigate who the hackers were.<ref name="The New York Times 2014" /> Mandiant became a subsidiary of FireEye.<ref name="The New York Times 2014" /> Since acquiring Mandiant, FireEye has been called in to investigate high-profile attacks against [[History of Target Corporation#2013 security breach|Target]], [[2014 JPMorgan Chase data breach|JP Morgan Chase]], [[Sony Pictures hack|Sony Pictures]], [[Anthem medical data breach|Anthem]], and others.<ref>{{cite web |title=FireEye has become Go-to Company for Breaches |url=https://www.usatoday.com/story/tech/2015/05/20/fireeye-mandiant-carefirst/27659481/ |access-date=May 21, 2015 |website=USA Today}}</ref>
In December 2012, founder Aziz stepped down as CEO and former [[McAfee]] CEO David DeWalt was appointed to the position.<ref name="Fortune 2016">{{cite web | title = FireEye Names New CEO | website = Fortune | date = May 6, 2016 | url = http://fortune.com/2016/05/06/fireeye-ceo-rumors/ | access-date=September 18, 2018 | first = Robert | last = Hackett}}</ref><ref name="Owens Delevett 2013">{{cite news | last1 = Owens | first1 = Jeremy C. | last2 = Delevett | first2 = Peter | title = FireEye's price more than doubles on Wall Street after eye-popping IPO | newspaper = [[The Mercury News]] | date = September 20, 2013 | url = https://www.mercurynews.com/2013/09/20/fireeyes-price-more-than-doubles-on-wall-street-after-eye-popping-ipo-2/ | access-date=September 22, 2018}}</ref><ref name="Reuters">{{cite web | title = FireEye names former McAfee exec Dave DeWalt as CEO, plans IPO | website = Reuters | date = November 28, 2012 | url = https://www.reuters.com/article/fireeye-ceo/fireeye-names-former-mcafee-exec-dave-dewalt-as-ceo-plans-ipo-idUSL1E8MSA7R20121128 | access-date=September 18, 2018}}</ref> DeWalt was recruited in order to prepare the company for an [[initial public offering]] (IPO).<ref name="USA TODAY 2013" /><ref name="Kelly 2013">{{cite web | last = Kelly | first = Meghan | title = FireEye brings more legitimacy to new security solutions with IPO filing | website = VentureBeat | date = August 5, 2013 | url = https://venturebeat.com/2013/08/05/fireeye-ipo/ | access-date=September 22, 2018}}</ref> The following year, FireEye raised an additional $50 million in venture capital, bringing its total funding to $85 million.<ref name="Westervelt 2013">{{cite web | last = Westervelt | first = Robert | title = FireEye Scores $50M Funding, Beefs Up Executive Team | website = CRN | date = January 10, 2013 | url = https://www.crn.com/news/security/240146043/fireeye-scores-50m-funding-beefs-up-executive-team.htm | access-date=September 22, 2018}}</ref><ref name="Bort 2013">{{cite web | last = Bort | first = Julie | title = Now Worth $1.25 Billion, FireEye Is The Next Hot Enterprise Startup To Watch | website = Business Insider | date = January 10, 2013 | url = https://www.businessinsider.com/fireeye-fundraising-2013-1 | access-date=September 22, 2018}}</ref> In late 2013, FireEye went public, raising $300 million.<ref name="Owens Delevett 2013"/>


The company diversified over time, in part through acquisitions. In 2010, FireEye expanded into the Middle East<ref name="ITP.net">{{cite web | title = FireEye Inc steps into the Middle East | website = ITP.net | url = http://www.itp.net/583119-fireeye-inc-steps-into-the-middle-east | first = Georgina | last = Enzer | access-date = September 18, 2018}}</ref> and the [[Asia-Pacific|Asian Pacific]]<ref name="CSO 2018">{{cite web | title = Security Watch: FireEye appoints first ever Asia Pac president | website = CSO | date = November 15, 2018 | url = https://www.cso.com.au/article/571608/fireeye-appoints-first-ever-asia-pac-president/ | access-date=November 15, 2018}}</ref> FireEye entered Europe in 2011<ref name="IT PRO 2011">{{cite web | title = FireEye looks to break into UK | website = IT PRO | date = March 17, 2011 | url = http://itpro.co.uk/go/14826 | access-date=September 18, 2018 | first = Tom | last = Brewster}}</ref> and Africa in 2013.<ref name="Doyle 2013">{{cite web | last = Doyle | first = Kirsten | title = FireEye opens local office | website = ITWeb | date = August 7, 2013 | url = https://www.itweb.co.za/content/okYbe9MX51jqAWpG | access-date=September 22, 2018}}</ref> At the time, FireEye was growing rapidly:revenues multiplied eight-fold between 2010 and 2012.<ref name="Owens Delevett 2013" /> However, FireEye was not yet profitable, due to high [[operating cost]]s such as [[research and development]] expenses.<ref name="Owens Delevett 2013" />
At the time, FireEye was growing rapidly.<ref name="Owens Delevett 2013" /> It had 175 employees in 2011, which grew to 900 by June 2013.<ref name="Owens Delevett 2013" /> Revenues multiplied eight-fold between 2010 and 2012.<ref name="Owens Delevett 2013" /> However, FireEye was not yet profitable, due to high operating costs such as research and development expenses.<ref name="Owens Delevett 2013" />


In December 2013, FireEye acquired [[Mandiant]] for $1 billion.<ref name="The New York Times 2014">{{cite web | first1 = Nicole | last1 = Perlroth | first2 = David | last2 = Sanger | title = FireEye Computer Security Firm Acquires Mandiant | website = The New York Times | date = January 3, 2014 | url = https://www.nytimes.com/2014/01/03/technology/fireeye-computer-security-firm-acquires-mandiant.html | access-date=September 18, 2018}}</ref> Mandiant was a private company founded in 2004 by Kevin Mandia that provided incident response services in the event of a data security breach.<ref name="The New York Times 2014" /><ref name="Reuters 2014">{{cite web | agency = Reuters | title = FireEye Buys Mandiant For $1 Billion In Huge Cyber Security Merger | website = Business Insider | date = January 2, 2014 | url = https://www.businessinsider.com/fireeye-buys-mandiant-for-1-billion-2014-1 | access-date=September 22, 2018}}</ref> Mandiant was known for investigating high-profile hacking groups.<ref name="The New York Times 2014" /> Before the acquisition, FireEye would often identify a security breach, then partner with Mandiant to investigate who the hackers were.<ref name="The New York Times 2014" /> Mandiant became a subsidiary of FireEye.<ref name="The New York Times 2014" />
In late 2014, FireEye initiated a [[Secondary market offering|secondary offering]], selling another $1.1bn in [[Share (finance)|shares]], to fund the development of a wider range of products.<ref name="Merced 2014">{{cite web | last = de la Merced | first = Michael J. | title = With Its Stock Riding High, FireEye Sells More Shares for $1.1 Billion | website = DealBook | date = March 10, 2014 | url = https://dealbook.nytimes.com/2014/03/07/with-its-stock-riding-high-fireeye-sells-more-shares-for-1-1-billion/ | access-date=September 22, 2018}}</ref> Shortly afterward, FireEye acquired high-speed packet capture company, nPulse, for approximately $60M.<ref name="TechCrunch 2014">{{cite web | title = FireEye Buys nPulse Technologies For $60M+ To Beef Up Network Security Suite | website = TechCrunch | date = May 6, 2014 | url = https://techcrunch.com/2014/05/06/fireeye-buys-npulse-technologies-for-60m-to-beef-up-network-security-suite/ | first = Ron | last = Miller | access-date=September 18, 2018}}</ref> By 2015, FireEye was making more than $100M in annual revenue, but was still unprofitable,<ref name="USA TODAY 2015">{{cite web | title = FireEye has become go-to company for breaches | website = USA TODAY | date = May 20, 2015 | url = https://www.usatoday.com/story/tech/2015/05/20/fireeye-mandiant-carefirst/27659481/ | access-date=September 18, 2018 | first = Elizabeth | last = Weise}}</ref> largely due to research and development overspending.<ref name="Anderson 2018" />


In January 2016, FireEye acquired iSIGHT Partners for $275M.<ref name="Finkle 2016">{{cite web | last = Finkle | first = Jim | title = FireEye buys cyber intelligence firm iSight Partners for $200 million | website = U.S. | date = January 20, 2016 | url = https://www.reuters.com/article/us-isight-fireeye-m-a/fireeye-buys-cyber-intelligence-firm-isight-partners-for-200-million-idUSKCN0UY2OU | access-date=September 22, 2018}}</ref> iSIGHT was a [[Threat Intelligence Platform|threat intelligence]] company<ref name="Fortune 20162">{{cite web | title = FireEye Makes a Big Acquisition | website = Fortune | date = January 20, 2016 | url = http://fortune.com/2016/01/20/fireeye-acquisition-isight-partners/ | access-date=September 22, 2018 | first = Robert | last = Hackett}}</ref> that gathered information about hacker groups and other cybersecurity risks.<ref name="Financial Times 2016">{{cite web | title = FireEye bulks up for 'cyber arms race' | website = Financial Times | date = January 20, 2016 | url = https://www.ft.com/content/35b30470-bfb0-11e5-846f-79b0e3d20eaf | access-date=September 22, 2018 | first = Hannah | last = Kuchler}}</ref> This was followed by the acquisition of Invotas, an IT security automation company.<ref name="Morgan 2016">{{cite web | last = Morgan | first = Steve | title = FireEye acquires Invotas; Who's next? | website = CSO Online | date = February 2, 2016 | url = https://www.csoonline.com/article/3029176/techology-business/fireeye-acquires-invotas-whos-next.html | access-date=September 22, 2018}}</ref><ref name="Beckerman 2016">{{cite web | last = Beckerman | first = Josh | title = FireEye Buys Invotas International | website = WSJ | date = February 2, 2016 | url = https://www.wsj.com/articles/fireeye-buys-invotas-international-1454375898 | access-date=September 22, 2018}}</ref> DeWalt stepped down as CEO in 2016 and was replaced by Mandiant CEO and former FireEye President Kevin Mandia.<ref name="Fortune 2016" /><ref name="Anderson 2018" /> Afterwards, there was downsizing and restructuring in response to lower-than-expected sales, resulting in a layoff of 300–400 employees.<ref name="Wieczner 2016">{{cite web | last = Wieczner | first = Jen | title = What FireEye's Stock Crash Says About Hacking | website = Fortune | date = August 5, 2016 | url = http://fortune.com/2016/08/05/fireeye-stock-feye-earnings/ | access-date=September 22, 2018}}</ref><ref name="Owens 2016">{{cite web | last = Owens | first = Jeremy C. | title = FireEye plans layoffs as new CEO takes the helm, stock plunges | website = MarketWatch | date = August 4, 2016 | url = https://www.marketwatch.com/story/fireeye-plans-layoffs-as-new-ceo-takes-the-helm-2016-08-04 | access-date = September 22, 2018}}</ref> Profit and revenue increased on account of shifts to a [[Subscription business model|subscription model]] and lower costs.<ref name="reuterssdl">{{cite web | last = Sharma | first = Vibhuti | title = FireEye earnings boosted by lower costs, higher subscriptions | website = Reuters | date = October 30, 2018 | url = https://www.reuters.com/article/us-fireeye-results-idUSKCN1N42Q7 | access-date=November 15, 2018}}</ref>
In late 2014, FireEye initiated a secondary offering, selling another $1.1 billion in shares, in order to fund development of a wider range of products.<ref name="Merced 2014">{{cite web | last = de la Merced | first = Michael J. | title = With Its Stock Riding High, FireEye Sells More Shares for $1.1 Billion | website = DealBook | date = March 10, 2014 | url = https://dealbook.nytimes.com/2014/03/07/with-its-stock-riding-high-fireeye-sells-more-shares-for-1-1-billion/ | access-date=September 22, 2018}}</ref> Shortly afterward, FireEye acquired another data breach investigation company, nPulse, for approximately $60 million.<ref name="TechCrunch 2014">{{cite web | title = FireEye Buys nPulse Technologies For $60M+ To Beef Up Network Security Suite | website = TechCrunch | date = May 6, 2014 | url = https://techcrunch.com/2014/05/06/fireeye-buys-npulse-technologies-for-60m-to-beef-up-network-security-suite/ | first = Ron | last = Miller | access-date=September 18, 2018}}</ref> By 2015, FireEye was making more than $100 million in annual revenue, but was still unprofitable,<ref name="USA TODAY 2015">{{cite web | title = FireEye has become go-to company for breaches | website = USA TODAY | date = May 20, 2015 | url = https://www.usatoday.com/story/tech/2015/05/20/fireeye-mandiant-carefirst/27659481/ | access-date=September 18, 2018 | first = Elizabeth | last = Weise}}</ref> largely due to research and development spending.<ref name="Anderson 2018" />


In March 2021, [[Symphony Technology Group]] (STG) acquired [[McAfee |McAfee Enterprise]] for $4bn.<ref name="rename">{{cite web |title=McAfee Enterprise and FireEye are now called Trellix |url=https://www.zdnet.com/article/mcafee-enterprise-and-fireeye-are-now-called-trellix/ |website=[[ZDNet]] |access-date=February 8, 2022}}</ref> In June 2021, FireEye announced the sale of its products business and name to STG for $1.2 bn.<ref name="selling"/> The sale split off its cyber forensics unit, [[Mandiant]],<ref>{{Cite web|title=FireEye Announces Sale of FireEye Products Business to Symphony Technology Group for $1.2 Billion|url=https://www.fireeye.com/company/press-releases/2021/fireeye-announces-sale-of-fireeye-products-business-to-symphony-technology-group.html|access-date=2021-06-10|website=FireEye|language=en}}</ref> and the FireEye [[Ticker symbol|stock symbol]] FEYE was relaunched as MNDT on the [[Nasdaq|NASDAQ]] on October 5, 2021.<ref>FireEye's [https://www.fireeye.com/company/press-releases/2021/fireeye-announces-mandiant-relaunch-at-cds-2021-trade-as-mndt.html press release] {{Webarchive|url=https://web.archive.org/web/20211019010532/https://www.fireeye.com/company/press-releases/2021/fireeye-announces-mandiant-relaunch-at-cds-2021-trade-as-mndt.html |date=October 19, 2021 }} about relaunch of Mandiant in [[Nasdaq|NASDAQ]]</ref> On January 18, 2022, STG announced the launch of Trellix, an extended detection and response company, which is a combination of FireEye and the McAfee enterprise business.<ref name="combined"/> On September 30, 2021, STG announced Bryan Palma as CEO of the combined company.<ref>[https://www.fireeye.com/company/press-releases/2021/symphony-technology-group-announces-bryan-palma-appointment.html Symphony Technology Group Announces Bryan Palma Appointment]</ref>
In January 2016, FireEye acquired iSIGHT Partners for $275 million.<ref name="Finkle 2016">{{cite web | last = Finkle | first = Jim | title = FireEye buys cyber intelligence firm iSight Partners for $200 million | website = U.S. | date = January 20, 2016 | url = https://www.reuters.com/article/us-isight-fireeye-m-a/fireeye-buys-cyber-intelligence-firm-isight-partners-for-200-million-idUSKCN0UY2OU | access-date=September 22, 2018}}</ref> iSIGHT was a [[Threat Intelligence Platform|threat intelligence]] company<ref name="Fortune 20162">{{cite web | title = FireEye Makes a Big Acquisition | website = Fortune | date = January 20, 2016 | url = http://fortune.com/2016/01/20/fireeye-acquisition-isight-partners/ | access-date=September 22, 2018 | first = Robert | last = Hackett}}</ref> that gathered information about hacker groups and other cybersecurity risks.<ref name="Financial Times 2016">{{cite web | title = FireEye bulks up for 'cyber arms race' | website = Financial Times | date = January 20, 2016 | url = https://www.ft.com/content/35b30470-bfb0-11e5-846f-79b0e3d20eaf | access-date=September 22, 2018 | first = Hannah | last = Kuchler}}</ref> This was followed by the acquisition of Invotas, an IT security automation company.<ref name="Morgan 2016">{{cite web | last = Morgan | first = Steve | title = FireEye acquires Invotas; Who's next? | website = CSO Online | date = February 2, 2016 | url = https://www.csoonline.com/article/3029176/techology-business/fireeye-acquires-invotas-whos-next.html | access-date=September 22, 2018}}</ref><ref name="Beckerman 2016">{{cite web | last = Beckerman | first = Josh | title = FireEye Buys Invotas International | website = WSJ | date = February 2, 2016 | url = https://www.wsj.com/articles/fireeye-buys-invotas-international-1454375898 | access-date=September 22, 2018}}</ref> DeWalt stepped down as CEO in 2016 and was replaced by Mandiant CEO and former FireEye President Kevin Mandia.<ref name="Fortune 2016" /><ref name="Anderson 2018" /> Afterwards, there was a downsizing and restructuring in response to lower-than-expected sales, resulting in a layoff of 300-400 employees.<ref name="Wieczner 2016">{{cite web | last = Wieczner | first = Jen | title = What FireEye's Stock Crash Says About Hacking | website = Fortune | date = August 5, 2016 | url = http://fortune.com/2016/08/05/fireeye-stock-feye-earnings/ | access-date=September 22, 2018}}</ref><ref name="Owens 2016">{{cite web | last = Owens | first = Jeremy C. | title = FireEye plans layoffs as new CEO takes the helm, stock plunges | website = MarketWatch | date = August 4, 2016 | url = https://www.marketwatch.com/story/fireeye-plans-layoffs-as-new-ceo-takes-the-helm-2016-08-04 | access-date = September 22, 2018}}</ref> Profit and revenue increased on account of shifts to a subscription model and lower costs.<ref name="reuterssdl">{{cite web | last = Sharma | first = Vibhuti | title = FireEye earnings boosted by lower costs, higher subscriptions | website = Reuters | date = October 30, 2018 | url = https://www.reuters.com/article/us-fireeye-results-idUSKCN1N42Q7 | access-date=November 15, 2018}}</ref>

In March 2021, [[Symphony Technology Group]] (STG) acquired [[McAfee |McAfee Enterprise]] for $4 billion.<ref name="rename">{{cite web |title=McAfee Enterprise and FireEye are now called Trellix |url=https://www.zdnet.com/article/mcafee-enterprise-and-fireeye-are-now-called-trellix/ |website=zdnet.com |access-date=February 8, 2022}}</ref> In June 2021, FireEye announced the sale of its products business and name to STG for $1.2 billion.<ref name="selling"/> The sale split off its cyber forensics unit, [[Mandiant]],<ref>{{Cite web|title=FireEye Announces Sale of FireEye Products Business to Symphony Technology Group for $1.2 Billion|url=https://www.fireeye.com/company/press-releases/2021/fireeye-announces-sale-of-fireeye-products-business-to-symphony-technology-group.html|access-date=2021-06-10|website=FireEye|language=en}}</ref> and the FireEye stock symbol FEYE was relaunched as MNDT on the [[Nasdaq|NASDAQ]] on 5 October 2021.<ref>FireEye's [https://www.fireeye.com/company/press-releases/2021/fireeye-announces-mandiant-relaunch-at-cds-2021-trade-as-mndt.html press release] about relaunch of Mandiant in [[Nasdaq|NASDAQ]]</ref> On January 18, 2022, STG announced the launch of Trellix, an extended detection and response company, which is a combination of FireEye and the McAfee enterprise business.<ref name="combined"/> On 30 September 2021, STG announced Bryan Palma as CEO of the combined company.<ref>[https://www.fireeye.com/company/press-releases/2021/symphony-technology-group-announces-bryan-palma-appointment.html Symphony Technology Group Announces Bryan Palma Appointment]</ref>


==Products and services==
==Products and services==
FireEye started out as a "sandboxing" company.<ref name="Oltsik 2015">{{cite web | last = Oltsik | first = Jon | title = FireEye Myth and Reality | website = CSO Online | date = October 15, 2015 | url = https://www.csoonline.com/article/2993882/security/fireeye-myth-and-reality.html | access-date=September 18, 2018}}</ref> Sandboxing is where incoming network traffic is opened within a virtual machine to test it for malicious software, before being introduced into the network.<ref name="The New York Times 2014" /><ref name="USA TODAY 2015" /> FireEye's products diversified over time, in part through acquisitions.<ref name="Fortune 2016" /><ref name="Oltsik 2015" /> In 2017, FireEye transitioned from primarily selling appliances, to a software-as-a-service model.<ref name="Fortune 2017">{{cite web | title = Cybersecurity Firm FireEye's Revenue Beats Street | website = Fortune | date = July 1, 2017 | url = http://fortune.com/2017/08/01/cybersecurity-fireeye-revenue-beats-street/ | access-date=September 22, 2018}}</ref>
FireEye started with "sandboxing",<ref name="Oltsik 2015">{{cite web | last = Oltsik | first = Jon | title = FireEye Myth and Reality | website = CSO Online | date = October 15, 2015 | url = https://www.csoonline.com/article/2993882/security/fireeye-myth-and-reality.html | access-date=September 18, 2018}}</ref> in which incoming network traffic is opened within a [[virtual machine]] to test it for malicious software before being introduced into the network.<ref name="The New York Times 2014" /><ref name="USA TODAY 2015" /> FireEye's products diversified over time, in part through acquisitions.<ref name="Fortune 2016" /><ref name="Oltsik 2015" /> In 2017, FireEye transitioned from primarily selling appliances, to a [[software-as-a-service]] model.<ref name="Fortune 2017">{{cite web | title = Cybersecurity Firm FireEye's Revenue Beats Street | website = Fortune | date = July 1, 2017 | url = http://fortune.com/2017/08/01/cybersecurity-fireeye-revenue-beats-street/ | access-date=September 22, 2018}}</ref>


FireEye sells technology products including network, email, and endpoint security, a platform for managing security operations centers called Helix, consulting services primarily based on incident response, and threat intelligence products.<ref name="Casaretto 2014">{{cite web | last = Casaretto | first = John | title = FireEye launches a new platform and details Mandiant integration | website = SiliconANGLE | date = February 14, 2014 | url = https://siliconangle.com/2014/02/14/fireeye-launches-a-new-platform-and-details-mandiant-integration/ | access-date=September 22, 2018}}</ref><ref name="Kuranda 2016">{{cite web | last = Kuranda | first = Sarah | title = FireEye Brings Together Security Portfolio Under New Helix Platform | website = CRN | date = November 30, 2016 | url = https://www.crn.com/news/security/300082959/fireeye-brings-together-security-portfolio-under-new-helix-platform.htm | access-date=September 22, 2018}}</ref>
FireEye sells technology products including network, email, and endpoint security, a platform for managing security operations centers called Helix, and consulting services primarily based on incident response and threat intelligence products.<ref name="Casaretto 2014">{{cite web | last = Casaretto | first = John | title = FireEye launches a new platform and details Mandiant integration | website = SiliconANGLE | date = February 14, 2014 | url = https://siliconangle.com/2014/02/14/fireeye-launches-a-new-platform-and-details-mandiant-integration/ | access-date=September 22, 2018}}</ref><ref name="Kuranda 2016">{{cite web | last = Kuranda | first = Sarah | title = FireEye Brings Together Security Portfolio Under New Helix Platform | website = CRN | date = November 30, 2016 | url = https://www.crn.com/news/security/300082959/fireeye-brings-together-security-portfolio-under-new-helix-platform.htm | access-date=September 22, 2018}}</ref>


The Central Management System (CMS) consolidates the management, reporting, and data sharing of Web MPS (Malware Protection System), Email MPS, File MPS, and Malware Analysis System (MAS) into a single network-based appliance by acting as a distribution hub for malware security intelligence.<ref>{{Cite web | url = http://sonoranweeklyreview.com/fireeye-forecasts-downbeat-results-for-current-quarter-shares-tumble-nasdaqfeye/ | title = FireEye Forecasts Downbeat Results for Current Quarter; Shares Tumble (NASDAQ:FEYE) - Sonoran Weekly Review | date = May 6, 2016 | website = Sonoran Weekly Review | language = en-US|access-date=May 6, 2016|archive-url=https://web.archive.org/web/20160810104924/http://sonoranweeklyreview.com/fireeye-forecasts-downbeat-results-for-current-quarter-shares-tumble-nasdaqfeye/|archive-date=August 10, 2016|url-status=dead}}</ref>
The Central Management System (CMS) consolidates the management, reporting, and data sharing of Web MPS (Malware Protection System), Email MPS, File MPS, and Malware Analysis System (MAS) into a single network-based appliance by acting as a distribution hub for malware security intelligence.<ref>{{Cite web | url = http://sonoranweeklyreview.com/fireeye-forecasts-downbeat-results-for-current-quarter-shares-tumble-nasdaqfeye/ | title = FireEye Forecasts Downbeat Results for Current Quarter; Shares Tumble (NASDAQ:FEYE) Sonoran Weekly Review | date = May 6, 2016 | website = Sonoran Weekly Review | language = en-US|access-date=May 6, 2016|archive-url=https://web.archive.org/web/20160810104924/http://sonoranweeklyreview.com/fireeye-forecasts-downbeat-results-for-current-quarter-shares-tumble-nasdaqfeye/|archive-date=August 10, 2016|url-status=dead}}</ref>


The FireEye Cloud crowd-sources Dynamic Threat Intelligence (DTI) detected by individual FireEye MPS appliances, and automatically distributes this time sensitive zero-day intelligence globally to all subscribed customers in frequent updates. Content Updates include a combination of DTI and FireEye Labs generated intelligence identified through research efforts.
The FireEye Cloud crowd-sources Dynamic Threat Intelligence (DTI) detected by individual FireEye MPS appliances and automatically distributes this time-sensitive zero-day intelligence globally to all subscribed customers in frequent updates. Content Updates include a combination of DTI and FireEye Labs generated intelligence identified through research efforts.


As of its inception in January 2022, Trellix has more than 40,000 customers, 5,000 employees, and $2 billion in annual revenue.<ref name="combined"/> Trellix includes the endpoint, cloud, collaboration, data and user, application, and infrastructure security capabilities of FireEye and McAfee.<ref name="combined"/> The business focuses on threat detection and response using machine learning and automation, with security technology that has the capability to learn and adapt in order to combat advanced threats.<ref name="rename"/>
As of its inception in January 2022, Trellix has more than 40,000 customers, 5,000 employees, and $2bn in annual revenue.<ref name="combined"/> Trellix includes the endpoint, cloud, collaboration, data and user, application, and infrastructure security capabilities of FireEye and McAfee.<ref name="combined"/> The business focuses on threat detection and response using machine learning and automation, with security technology that can learn and adapt to combat advanced threats.<ref name="rename"/>


==Operations==
==Operations==
FireEye has been known for uncovering high-profile hacking groups.<ref name="Fortune 2016" />
FireEye has been known for uncovering high-profile hacking groups.<ref name="Fortune 2016" />


===2008-2014===
===2008–2014===
In October/November 2009, FireEye participated in an effort to take down the [[Mega-D botnet]] (also known as Ozdok).<ref>{{cite news | last = Cheng | first = Jacqui | title = Researchers' well-aimed stone takes down Goliath botnet | publisher = Ars Technica | date = November 11, 2009 | url = https://arstechnica.com/security/news/2009/11/researchers-well-aimed-stone-take-down-goliath-botnet.ars | access-date = November 30, 2009}}</ref> On March 16, 2011, the [[Rustock botnet]] was taken down through an action by [[Microsoft]], US federal law enforcement agents, FireEye, and the [[University of Washington]].<ref>{{cite news | last = Wingfield | first = Nick | title = Spam Network Shut Down | newspaper = Wall Street Journal | date = March 18, 2011 | url = https://www.wsj.com/articles/SB10001424052748703328404576207173861008758 | access-date = March 18, 2011}}</ref> In July 2012, FireEye was involved in analysis<ref>{{cite web | url = http://blog.fireeye.com/research/2012/07/killing-the-beast-part-5.html | title = FireEye Blog &#124; Threat Research, Analysis, and Mitigation | publisher = Blog.fireeye.com | access-date = April 12, 2014 |url-status=dead | archive-url = https://web.archive.org/web/20130131071855/http://blog.fireeye.com/research/2012/07/killing-the-beast-part-5.html | archive-date = January 31, 2013}}</ref> of the [[Grum botnet|Grum]] botnet's [[command and control]] servers located in the Netherlands, Panama, and Russia.<ref>{{cite web |title=Cybercriminals no longer control Grum botnet, researchers say |url=https://www.computerworld.com/article/2506096/cybercriminals-no-longer-control-grum-botnet--researchers-say.html |website=computerworld.com |access-date=February 15, 2022}}</ref>
In October/November 2009, FireEye participated to take down the [[Mega-D botnet]] (also known as Ozdok).<ref>{{cite news | last = Cheng | first = Jacqui | title = Researchers' well-aimed stone takes down Goliath botnet | publisher = Ars Technica | date = November 11, 2009 | url = https://arstechnica.com/security/news/2009/11/researchers-well-aimed-stone-take-down-goliath-botnet.ars | access-date = November 30, 2009}}</ref> On March 16, 2011, the [[Rustock botnet]] was taken down through action by [[Microsoft]], US federal law enforcement agents, FireEye, and the [[University of Washington]].<ref>{{cite news | last = Wingfield | first = Nick | title = Spam Network Shut Down | newspaper = Wall Street Journal | date = March 18, 2011 | url = https://www.wsj.com/articles/SB10001424052748703328404576207173861008758 | access-date = March 18, 2011}}</ref> In July 2012, FireEye was involved in the analysis<ref>{{cite web | url = http://blog.fireeye.com/research/2012/07/killing-the-beast-part-5.html | title = FireEye Blog &#124; Threat Research, Analysis, and Mitigation | publisher = Blog.fireeye.com | access-date = April 12, 2014 |url-status=dead | archive-url = https://web.archive.org/web/20130131071855/http://blog.fireeye.com/research/2012/07/killing-the-beast-part-5.html | archive-date = January 31, 2013}}</ref> of the [[Grum botnet|Grum]] botnet's [[command and control]] servers located in the Netherlands, Panama, and Russia.<ref>{{cite web |title=Cybercriminals no longer control Grum botnet, researchers say |url=https://www.computerworld.com/article/2506096/cybercriminals-no-longer-control-grum-botnet--researchers-say.html |website=computerworld.com |date=July 19, 2012 |access-date=February 15, 2022}}</ref>


In 2013, Mandiant (before being acquired by FireEye) uncovered a multi-year espionage effort by a Chinese hacking group called APT1.<ref name="Sanger Barboza Perlroth 2013">{{cite web | last1 = Sanger | first1 = David E. | last2 = Barboza | first2 = David | last3 = Perlroth | first3 = Nicole | title = China's Army Is Seen as Tied to Hacking Against U.S. | website = The New York Times | date = February 18, 2013 | url = https://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html | access-date=October 15, 2018}}</ref>
In 2013, Mandiant (before being acquired by FireEye) uncovered a multi-year espionage effort by a Chinese hacking group called APT1.<ref name="Sanger Barboza Perlroth 2013">{{cite web | last1 = Sanger | first1 = David E. | last2 = Barboza | first2 = David | last3 = Perlroth | first3 = Nicole | title = China's Army Is Seen as Tied to Hacking Against U.S. | website = The New York Times | date = February 18, 2013 | url = https://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html | access-date=October 15, 2018}}</ref>


In 2014, the FireEye Labs team identified two new zero-day vulnerabilities – {{CVE|2014-4148|2014-4113|leadout=and}} – as part of limited, targeted attacks against major corporations. Both zero-days exploit the [[Architecture of Windows NT|Windows kernel]]. Microsoft addressed the vulnerabilities in their October 2014 Security Bulletin.<ref>{{cite web | title = Microsoft Security Bulletin Summary for October 2014 | url = https://technet.microsoft.com/library/security/ms14-oct | publisher = Microsoft | access-date = June 21, 2017}}</ref> Also in 2014, FireEye provided information on a threat group it calls FIN4. FIN4 appears to conduct intrusions that are focused on a single objective: obtaining access to insider information capable of making or breaking the stock prices of public companies. The group has targeted hundreds of companies, and specifically targets the emails of [[Corporate title|C-level executives]], legal counsel, regulatory, risk, and compliance personnel, and other individuals who would regularly discuss confidential, market-moving information.<ref>{{cite news | last1 = Sullivan | first1 = Gail | title = Report: 'FIN4' hackers are gaming markets by stealing insider info | url = https://www.washingtonpost.com/news/morning-mix/wp/2014/12/02/report-hackers-are-gaming-markets-by-stealing-insider-info/ | access-date = June 21, 2017 | newspaper = Washington Post | date = December 2, 2014}}</ref> Also in 2014, FireEye released a report focused on a threat group it refers to as APT28. APT28 focuses on collecting intelligence that would be most useful to a government. FireEye found that since at least 2007, APT28 has been targeting privileged information related to governments, militaries, and security organizations that would likely benefit the Russian government.<ref>{{cite news | last1 = Fox-Brewster | first1 = Tom | title = 'State sponsored' Russian hacker group linked to cyber attacks on neighbours | url = https://www.theguardian.com/technology/2014/oct/29/russian-hacker-group-cyber-attacks-apt28 | work = The Guardian | date = October 29, 2014}}</ref>
In 2014, the FireEye Labs team identified two new zero-day vulnerabilities – {{CVE|2014–4148|2014–4113|leadout=and}} – as part of limited, targeted attacks against major corporations. Both zero-days exploit the [[Architecture of Windows NT|Windows kernel]]. Microsoft addressed the vulnerabilities in the October 2014 Security Bulletin.<ref>{{cite web | title = Microsoft Security Bulletin Summary for October 2014 | url = https://technet.microsoft.com/library/security/ms14-oct | publisher = Microsoft | access-date = June 21, 2017}}</ref> Also in 2014, FireEye provided information on a threat group it calls FIN4. FIN4 appears to conduct intrusions that are focused on a single objective: obtaining access to insider information capable of making or breaking the stock prices of public companies.
The group has targeted hundreds of companies and specifically targets the emails of [[Corporate title|corporate-level executives]], legal counsel, regulatory personnel, and individuals who would regularly discuss market-moving information.<ref>{{cite news | last1 = Sullivan | first1 = Gail | title = Report: 'FIN4' hackers are gaming markets by stealing insider info | url = https://www.washingtonpost.com/news/morning-mix/wp/2014/12/02/report-hackers-are-gaming-markets-by-stealing-insider-info/ | access-date = June 21, 2017 | newspaper = Washington Post | date = December 2, 2014}}</ref> Also in 2014, FireEye released a report focused on a threat group it refers to as APT28. APT28 focuses on collecting intelligence that would be most useful to a government. FireEye found that since at least 2007, APT28 has been targeting privileged information related to governments, militaries, and security organizations that would likely benefit the Russian government.<ref>{{cite news | last1 = Fox-Brewster | first1 = Tom | title = 'State sponsored' Russian hacker group linked to cyber attacks on neighbours | url = https://www.theguardian.com/technology/2014/oct/29/russian-hacker-group-cyber-attacks-apt28 | work = The Guardian | date = October 29, 2014}}</ref>


===2015===
===2015===
In 2015, FireEye confirmed the existence of at least 14 router implants spread across four different countries: [[Ukraine]], [[Philippines]], [[Mexico]], and [[India]]. Referred to as SYNful Knock, the implant is a stealthy modification of the router’s firmware image that can be used to maintain persistence within a victim’s network.<ref>{{cite news | last1 = Leyden | first1 = John | title = Compromised Cisco routers spotted bimbling about in the wild | url = https://www.theregister.co.uk/2015/09/15/compromised_cisco_routers/ | access-date = June 21, 2017 | publisher = The Register | date = September 15, 2015}}</ref>
In 2015, FireEye confirmed the existence of at least 14 router implants spread across four different countries: Ukraine, the Philippines, Mexico, and India. Referred to as SYNful Knock, the implant is a stealthy modification of the router’s firmware image that can be used to maintain persistence within a victim’s network.<ref>{{cite news | last1 = Leyden | first1 = John | title = Compromised Cisco routers spotted bimbling about in the wild | url = https://www.theregister.co.uk/2015/09/15/compromised_cisco_routers/ | access-date = June 21, 2017 | publisher = The Register | date = September 15, 2015}}</ref>


In September 2015, FireEye obtained an injunction against a security researcher attempting to report vulnerabilities in FireEye Malware Protection System.<ref>{{cite news | url = https://arstechnica.com/security/2015/09/security-company-sues-to-bar-disclosure-related-to-its-own-flaws/ | title = Security company litigates to bar disclosure related to its own flaws | first = Dan | last = Goodin | date = September 11, 2015 | website = [[ArsTechnica]] | access-date = September 12, 2015}}</ref>
In September 2015, FireEye obtained an injunction against a security researcher attempting to report vulnerabilities in FireEye Malware Protection System.<ref>{{cite news | url = https://arstechnica.com/security/2015/09/security-company-sues-to-bar-disclosure-related-to-its-own-flaws/ | title = Security company litigates to bar disclosure related to its flaws | first = Dan | last = Goodin | date = September 11, 2015 | website = [[ArsTechnica]] | access-date = September 12, 2015}}</ref>


In 2015, FireEye uncovered an attack exploiting two previously unknown vulnerabilities, one in [[Microsoft Office]] ({{CVE|2015-2545}}) and another in Windows ({{CVE|2015-2546}}). The attackers hid the exploit within a [[Microsoft Word]] document (.docx) that appeared to be a résumé. The combination of these two exploits grant fully privileged remote code execution. Both vulnerabilities were patched by Microsoft.<ref>{{cite web | title = Acknowledgments – 2015 | url = https://technet.microsoft.com/library/security/dn903755.aspx | publisher = Microsoft | access-date = June 21, 2017}}</ref>
In 2015, FireEye uncovered an attack exploiting two previously unknown vulnerabilities, one in [[Microsoft Office]] ({{CVE|2015–2545}}) and another in Windows ({{CVE|2015–2546}}). The attackers hid the exploit within a [[Microsoft Word]] document (.docx) that appeared to be a résumé. The combination of these two exploits grants fully privileged remote code execution. Both vulnerabilities were patched by Microsoft.<ref>{{cite web | title = Acknowledgments – 2015 | url = https://technet.microsoft.com/library/security/dn903755.aspx | publisher = Microsoft | access-date = June 21, 2017}}</ref>


In 2015, the FireEye as a Service team in [[Singapore]] uncovered a phishing campaign exploiting an [[Adobe Flash Player]] zero-day vulnerability ({{CVE|2015-3113}}). Adobe released a patch for the vulnerability with an out-of-band security bulletin. FireEye attributed the activity to a [[China]]-based threat group it tracks as APT3.<ref>{{cite web | title = Security updates available for Adobe Flash Player | url = https://helpx.adobe.com/security/products/flash-player/apsb15-14.html | publisher = Adobe | access-date = June 21, 2017}}</ref>
In 2015, the FireEye as a Service team in [[Singapore]] uncovered a phishing campaign exploiting an [[Adobe Flash Player]] zero-day vulnerability ({{CVE|2015–3113}}). Adobe released a patch for the vulnerability with an out-of-band security bulletin. FireEye attributed the activity to a [[China]]-based threat group it tracks as APT3.<ref>{{cite web | title = Security updates available for Adobe Flash Player | url = https://helpx.adobe.com/security/products/flash-player/apsb15-14.html | publisher = Adobe | access-date = June 21, 2017}}</ref>


===2016===
===2016===
In 2016, FireEye announced that it has been tracking a pair of cybercriminals referred to as the “Vendetta Brothers.” The company said that the enterprising duo uses various strategies to compromise point-of-sale systems, steal payment card information and sell it on their underground marketplace “Vendetta World.”<ref>{{cite news | last1 = Korolov | first1 = Maria | title = Diversified supply chain helps 'Vendetta Brothers' succeed in criminal business | url = http://www.csoonline.com/article/3125744/investigations-forensics/diversified-supply-chain-helps-vendetta-brothers-succeed-in-criminal-business.html | access-date = June 21, 2017 | publisher = CSO | date = September 29, 2016}}</ref>
In 2016, FireEye announced that it had been tracking a pair of cybercriminals referred to as the “Vendetta Brothers.” The company said that the enterprising duo uses various strategies to compromise point-of-sale systems, steal payment card information, and sell it on their underground marketplace “Vendetta World.”<ref>{{cite news | last1 = Korolov | first1 = Maria | title = Diversified supply chain helps 'Vendetta Brothers' succeed in criminal business | url = http://www.csoonline.com/article/3125744/investigations-forensics/diversified-supply-chain-helps-vendetta-brothers-succeed-in-criminal-business.html | access-date = June 21, 2017 | publisher = CSO | date = September 29, 2016}}</ref>
In mid-2016, FireEye released a report on the impact of the 2015 agreement between former [[President of United States|U.S. President]] [[Barack Obama]] and [[China]]'s [[paramount leader]] [[Xi Jinping]] that neither government would “conduct or knowingly support cyber-enabled theft of intellectual property” for an economic advantage. The security firm reviewed the activity of 72 groups that it suspects are operating in China or otherwise support Chinese state interests and determined that, as of mid-2014, there was an overall decrease in successful network compromises by China-based groups against organizations in the U.S. and 25 other countries.<ref>{{cite news | last1 = Hackett | first1 = Robert | title = China's Cyber Spying on the U.S. Has Drastically Changed | url = http://fortune.com/2016/06/25/fireeye-mandia-china-hackers/ | access-date = June 21, 2017 | publisher = Fortune | date = June 25, 2016}}</ref>
In mid-2016, FireEye released a report on the impact of the 2015 agreement between former [[President of United States|U.S. President]] [[Barack Obama]] and [[China]]'s [[paramount leader]] [[Xi Jinping]] that neither government would “conduct or knowingly support cyber-enabled theft of intellectual property” for economic advantage.
The security firm reviewed the activity of 72 groups that it suspects are operating in China or otherwise support Chinese state interests and determined that, as of mid-2014, there was an overall decrease in successful network compromises by China-based groups against organizations in the U.S. and 25 other countries.<ref>{{cite news | last1 = Hackett | first1 = Robert | title = China's Cyber Spying on the U.S. Has Drastically Changed | url = http://fortune.com/2016/06/25/fireeye-mandia-china-hackers/ | access-date = June 21, 2017 | publisher = Fortune | date = June 25, 2016}}</ref>


In 2016, FireEye announced that it had identified several versions of an [[Industrial control system|ICS]]-focused malware – dubbed IRONGATE – crafted to manipulate a specific industrial process running within a simulated Siemens control system environment. Although Siemens Product Computer Emergency Readiness Team (ProductCERT) confirmed to FireEye that IRONGATE is not viable against operational Siemens control systems and that IRONGATE does not exploit any vulnerabilities in Siemens products, the security firm said that IRONGATE invokes ICS attack concepts first seen in [[Stuxnet]].<ref>{{cite news | last1 = Cox | first1 = Joseph | title = There's a Stuxnet Copycat, and We Have No Idea Where It Came From | url = https://motherboard.vice.com/en_us/article/theres-a-stuxnet-copycat-and-we-have-no-idea-where-it-came-from | access-date = June 21, 2017 | publisher = Motherboard | date = June 2, 2016}}</ref>
In 2016, FireEye announced that it had identified several versions of an [[Industrial control system|ICS]]-focused malware – dubbed IRON GATE – crafted to manipulate a specific industrial process running within a simulated Siemens control system environment. Although Siemens Product Computer Emergency Readiness Team (ProductCERT) confirmed to FireEye that IRON GATE is not viable against operational Siemens control systems and that IRON GATE does not exploit any vulnerabilities in Siemens products, the security firm said that IRON GATE invokes ICS attack concepts first seen in [[Stuxnet]].<ref>{{cite news | last1 = Cox | first1 = Joseph | title = There's a Stuxnet Copycat, and We Have No Idea Where It Came From | url = https://motherboard.vice.com/en_us/article/theres-a-stuxnet-copycat-and-we-have-no-idea-where-it-came-from | access-date = June 21, 2017 | publisher = Motherboard | date = June 2, 2016}}</ref>


On May 8, 2016, FireEye detected an attack exploiting a previously unknown vulnerability in Adobe Flash Player ({{CVE|2016-4117}}). The security firm reported the issue to the Adobe Product Security Incident Response Team (PSIRT) and Adobe released a patch for the vulnerability just four days later.<ref>{{cite web | title = Security updates available for Adobe Flash Player | url = https://helpx.adobe.com/security/products/flash-player/apsb16-15.html | publisher = Adobe | access-date = June 21, 2017}}</ref>
On May 8, 2016, FireEye detected an attack exploiting a previously unknown vulnerability in Adobe Flash Player ({{CVE|2016–4117}}). The security firm reported the issue to the Adobe Product Security Incident Response Team (PSIRT) and Adobe released a patch for the vulnerability just four days later.<ref>{{cite web | title = Security updates available for Adobe Flash Player | url = https://helpx.adobe.com/security/products/flash-player/apsb16-15.html | publisher = Adobe | access-date = June 21, 2017}}</ref>


In 2016, FireEye discovered a widespread vulnerability affecting [[Android (operating system)|Android]] devices that permits local privilege escalation to the built-in user “radio”, making it so an attacker can potentially perform activities such as viewing the victim’s SMS database and phone history. FireEye reached out to [[Qualcomm]] in January 2016 and subsequently worked with the Qualcomm Product Security Team to address the issue.<ref>{{cite news | last1 = Goodin | first1 = Dan | title = Critical Qualcomm security bug leaves many phones open to attack | url = https://arstechnica.com/security/2016/05/5-year-old-android-vulnerability-exposes-texts-and-call-histories/ | access-date = June 21, 2017 | publisher = Ars Technica | date = May 5, 2016}}</ref>
In 2016, FireEye discovered a widespread vulnerability affecting [[Android (operating system)|Android]] devices that permit local privilege escalation to the built-in user “radio”, making it so an attacker can potentially perform activities such as viewing the victim’s SMS database and phone history. FireEye reached out to [[Qualcomm]] in January 2016 and subsequently worked with the Qualcomm Product Security Team to address the issue.<ref>{{cite news | last1 = Goodin | first1 = Dan | title = Critical Qualcomm security bug leaves many phones open to attack | url = https://arstechnica.com/security/2016/05/5-year-old-android-vulnerability-exposes-texts-and-call-histories/ | access-date = June 21, 2017 | publisher = Ars Technica | date = May 5, 2016}}</ref>


In 2016, FireEye provided details on FIN6, a cyber criminal group that steals payment card data for monetization from targets predominately in the hospitality and retail sectors. The group was observed aggressively targeting and compromising point-of-sale (POS) systems, and making off with millions of payment card numbers that were later sold on an underground marketplace.<ref>{{cite news | last1 = Taylor | first1 = Harriet | title = What one criminal gang does with stolen credit cards | url = https://www.cnbc.com/2016/04/20/what-one-criminal-gang-does-with-stolen-credit-cards.html | access-date = June 21, 2017 | publisher = CNBC | date = April 20, 2016}}</ref>
In 2016, FireEye provided details on FIN6, a cybercriminal group that steals payment card data for monetization from targets predominately in the hospitality and retail sectors. The group was observed aggressively targeting and compromising point-of-sale (POS) systems, and making off millions of payment card numbers that were later sold on an underground marketplace.<ref>{{cite news | last1 = Taylor | first1 = Harriet | title = What one criminal gang does with stolen credit cards | url = https://www.cnbc.com/2016/04/20/what-one-criminal-gang-does-with-stolen-credit-cards.html | access-date = June 21, 2017 | publisher = CNBC | date = April 20, 2016}}</ref>


===2017-2019===
===2017–2019===
In 2017, FireEye detected malicious Microsoft Office RTF documents leveraging a previously undisclosed vulnerability, {{CVE|2017-0199}}. This vulnerability allows a malicious actor to download and execute a Visual Basic script containing PowerShell commands when a user opens a document containing an embedded exploit. FireEye shared the details of the vulnerability with Microsoft and coordinated public disclosure timed with the release of a patch by Microsoft to address the vulnerability.<ref>{{cite web | title = CVE-2017-0199 Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API | url = https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0199 | publisher = Microsoft | access-date = June 21, 2017}}</ref>
In 2017, FireEye detected malicious Microsoft Office RTF documents leveraging a previously undisclosed vulnerability, {{CVE|2017-0199}}. This vulnerability allows a malicious actor to download and execute a Visual Basic script containing PowerShell commands when a user opens a document containing an embedded exploit. FireEye shared the details of the vulnerability with Microsoft and coordinated public disclosure timed with the release of a patch by Microsoft to address the vulnerability.<ref>{{cite web | title = CVE-2017-0199 Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API | url = https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0199 | publisher = Microsoft | access-date = June 21, 2017}}</ref>


In 2018, FireEye helped [[Facebook]] identify 652 fake accounts.<ref name="NYT">{{cite web | title = How FireEye Helped Facebook Spot a Disinformation Campaign | website = The New York Times | date = August 23, 2018 | url = https://www.nytimes.com/2018/08/23/technology/fireeye-facebook-disinformation.html | access-date=September 22, 2018 | first1 = Kate | last1 = Conger | first2 = Sheera | last2 = Frenkel}}</ref>
In 2018, FireEye helped [[Facebook]] identify 652 fake accounts.<ref name="NYT">{{cite web | title = How FireEye Helped Facebook Spot a Disinformation Campaign | website = The New York Times | date = August 23, 2018 | url = https://www.nytimes.com/2018/08/23/technology/fireeye-facebook-disinformation.html | access-date=September 22, 2018 | first1 = Kate | last1 = Conger | first2 = Sheera | last2 = Frenkel}}</ref>


===2020-2021===
===2020–2021===
FireEye revealed on Tuesday, December 8, 2020 that its own systems were pierced by what it called "a nation with top-tier offensive capabilities".<ref name="sc-2020-12-08">{{Cite web|url=https://www.scmagazine.com/home/security-news/apts-cyberespionage/fireeye-hacked-red-team-tools-stolen/|title = FireEye hacked, red team tools stolen|date = December 8, 2020}}</ref> The company said the attackers used "novel techniques" to steal copies of FireEye's [[red team]] tool kit, which the attackers could potentially use in other attacks.<ref name="nyt-2020-12-08">{{cite web | title = FireEye, a Top Cybersecurity Firm, Says It Was Hacked by a Nation-State | website = The New York Times | date = December 8, 2020 | url = https://www.nytimes.com/2020/12/08/technology/fireeye-hacked-russians.html | first1 = David E. | last1 = Sanger | first2 = Nicole | last2 = Perlroth}}</ref><ref>{{Cite web|url=http://www.theguardian.com/technology/2020/dec/08/fireeye-hack-cybersecurity-theft|title=US cybersecurity firm FireEye says it was hacked by foreign government|first=Guardian staff and|last=agencies|date=December 9, 2020|website=the Guardian}}</ref> The same day, FireEye published countermeasures against the tools that had been stolen.<ref name="wired-2020-12-08">{{Cite magazine|url=https://www.wired.com/story/russia-fireeye-hack-statement-not-catastrophe/|title=Russia's FireEye Hack Is a Statement—but Not a Catastrophe|magazine=Wired|via=www.wired.com|access-date=December 17, 2020|archive-date=December 16, 2020|archive-url=https://web.archive.org/web/20201216000225/https://www.wired.com/story/russia-fireeye-hack-statement-not-catastrophe/|url-status=live|last1=Newman|first1=Lily Hay}}</ref><ref name="fireeye-2020-12-08-countermeasures">{{cite web | title=fireeye/red_team_tool_countermeasures | website=GitHub | url=https://github.com/fireeye/red_team_tool_countermeasures | access-date=2020-12-17}}</ref>
FireEye revealed on Tuesday, December 8, 2020, that its systems were pierced by what it called "a nation with top-tier offensive capabilities".<ref name="sc-2020-12-08">{{Cite web|url=https://www.scmagazine.com/home/security-news/apts-cyberespionage/fireeye-hacked-red-team-tools-stolen/|title = FireEye hacked, red team tools stolen|date = December 8, 2020}}</ref> The company said the attackers used "novel techniques" to steal copies of FireEye's [[red team]] tool kit, which the attackers could potentially use in other attacks.<ref name="nyt-2020-12-08">{{cite web | title = FireEye, a Top Cybersecurity Firm, Says It Was Hacked by a Nation-State | website = The New York Times | date = December 8, 2020 | url = https://www.nytimes.com/2020/12/08/technology/fireeye-hacked-russians.html | first1 = David E. | last1 = Sanger | first2 = Nicole | last2 = Perlroth}}</ref><ref>{{Cite web|url=http://www.theguardian.com/technology/2020/dec/08/fireeye-hack-cybersecurity-theft|title=US cybersecurity firm FireEye says it was hacked by foreign government|first=Guardian staff and|last=agencies|date=December 9, 2020|website=the Guardian}}</ref> The same day, FireEye published countermeasures against the tools that had been stolen.<ref name="wired-2020-12-08">{{Cite magazine|url=https://www.wired.com/story/russia-fireeye-hack-statement-not-catastrophe/|title=Russia's FireEye Hack Is a Statement—but Not a Catastrophe|magazine=Wired|via=www.wired.com|access-date=December 17, 2020|archive-date=December 16, 2020|archive-url=https://web.archive.org/web/20201216000225/https://www.wired.com/story/russia-fireeye-hack-statement-not-catastrophe/|url-status=live|last1=Newman|first1=Lily Hay}}</ref><ref name="fireeye-2020-12-08-countermeasures">{{cite web | title=fireeye/red_team_tool_countermeasures | website=GitHub | url=https://github.com/fireeye/red_team_tool_countermeasures | access-date=2020-12-17}}</ref>


A week later in December 2020, FireEye reported the [[SolarWinds#2020 supply chain attack|SolarWinds supply chain attack]] to the [[U.S. National Security Agency]] (NSA), the federal agency responsible for defending the U.S. from cyberattacks, and said its tools were stolen by the same actors. The NSA is not known to have been aware of the attack before being notified by FireEye. The NSA uses SolarWinds software itself.<ref name="nyt-2020-12-14">{{Cite news|url=https://www.nytimes.com/2020/12/14/us/politics/russia-hack-nsa-homeland-security-pentagon.html|title=Scope of Russian Hack Becomes Clear: Multiple U.S. Agencies Were Hit|first1=David E.|last1=Sanger|first2=Nicole|last2=Perlroth|first3=Eric|last3=Schmitt|newspaper=The New York Times|date=December 15, 2020}}</ref>
A week later in December 2020, FireEye reported the [[SolarWinds#2020 supply chain attack|SolarWinds supply chain attack]] to the [[U.S. National Security Agency]] (NSA), the federal agency responsible for defending the U.S. from cyberattacks, and said its tools were stolen by the same actors. The NSA is not known to have been aware of the attack before being notified by FireEye. The NSA uses SolarWinds software itself.<ref name="nyt-2020-12-14">{{Cite news|url=https://www.nytimes.com/2020/12/14/us/politics/russia-hack-nsa-homeland-security-pentagon.html|title=Scope of Russian Hack Becomes Clear: Multiple U.S. Agencies Were Hit|first1=David E.|last1=Sanger|first2=Nicole|last2=Perlroth|first3=Eric|last3=Schmitt|newspaper=The New York Times|date=December 15, 2020}}</ref>
Line 104: Line 108:
Within a week of FireEye's breach, cyber-security firm McAfee said the stolen tools had been used in at least 19 countries, including the US, the UK, Ireland, the Netherlands, and Australia.<ref name="bbc-2020-12-15">{{cite web | title=SolarWinds Orion: More US government agencies hacked | website=BBC News | date=2020-12-15 | url=https://www.bbc.com/news/technology-55318815 | access-date=2020-12-17}}</ref>
Within a week of FireEye's breach, cyber-security firm McAfee said the stolen tools had been used in at least 19 countries, including the US, the UK, Ireland, the Netherlands, and Australia.<ref name="bbc-2020-12-15">{{cite web | title=SolarWinds Orion: More US government agencies hacked | website=BBC News | date=2020-12-15 | url=https://www.bbc.com/news/technology-55318815 | access-date=2020-12-17}}</ref>


During continued investigation of the hack of their data and that of federal agencies revealed on December 8, 2020, FireEye reported in early January that the hacks originated from inside the USA, sometimes very close to the facilities affected, which enabled the hackers to evade surveillance by the National Security Agency and the defenses used by the department of Homeland Security.<ref>Allen, Mike, ''[https://www.axios.com/newsletters/axios-am-d4d77f20-c35e-492f-8b9a-babd95007cc9.html Russia hacked from inside U.S.]'', Axios, January 3, 2021</ref>
During the continued investigation of the hack of their data and that of federal agencies revealed on December 8, 2020, FireEye reported in early January that the hacks originated from inside the USA, sometimes very close to the facilities affected, which enabled the hackers to evade surveillance by the National Security Agency and the defenses used by the Department of Homeland Security.<ref>Allen, Mike, ''[https://www.axios.com/newsletters/axios-am-d4d77f20-c35e-492f-8b9a-babd95007cc9.html Russia hacked from inside U.S.]'', Axios, January 3, 2021</ref>


===2022===
===2022===
A 2022 report by Trellix noted that hacking groups Wicked Panda (linked to China) and [[Cozy Bear]] (linked to Russia) were behind 46% of all state-sponsored hacking campaigns in the third quarter of 2021, and that in a third of all state-sponsored cyber attacks, the hackers abused [[Cobalt Strike]] security tools to get access to the victim's network.<ref>{{cite web |title=Bracing for cyber-spying at the Olympics |url=https://www.politico.com/newsletters/weekly-cybersecurity/2022/01/31/bracing-for-cyber-spying-at-the-olympics-00003512 |website=politico.com |access-date=February 15, 2022}}</ref> In a January 2022 report on [[Fox News]], Trellix CEO Bryan Palma stated that there is an increasing level of cyberwarfare threats from Russia and China.<ref>{{cite web |title=Russia and China ramping up cyber threats: Trellix CEO |url=https://video.foxbusiness.com/v/6294657944001#sp=show-clips |website=foxnews.com |access-date=February 15, 2022}}</ref>
A 2022 report by Trellix noted that hacking groups Wicked Panda (linked to China) and [[Cozy Bear]] (linked to Russia) were behind 46% of all state-sponsored hacking campaigns in the third quarter of 2021 and that in a third of all state-sponsored cyber attacks, the hackers abused Cobalt Strike security tools to get access to the victim's network.<ref>{{cite web |title=Bracing for cyber-spying at the Olympics |url=https://www.politico.com/newsletters/weekly-cybersecurity/2022/01/31/bracing-for-cyber-spying-at-the-olympics-00003512 |website=politico.com |access-date=February 15, 2022}}</ref> In a January 2022 report on [[Fox News]], Trellix CEO Bryan Palma stated that there is an increasing level of cyberwarfare threats from Russia and China.<ref>{{cite web |title=Russia and China ramping up cyber threats: Trellix CEO |url=https://video.foxbusiness.com/v/6294657944001#sp=show-clips |website=foxnews.com |access-date=February 15, 2022}}</ref>


A 2022 Trellix report stated that hackers are using [[Microsoft OneDrive]] in an espionage campaign against government officials in Western Asia. The malware, named by Trellix as Graphite, employs [[Microsoft Graph]] to use OneDrive as a command and control server and execute the malware. The attack is split into multiple stages in order to remain hidden for as long as possible.<ref>{{cite web |title=Trellix finds OneDrive malware targeting government officials in Western Asia |url=https://www.zdnet.com/article/trellix-finds-onedrive-malware-campaign-targeting-govt-officials-in-western-asia/ |website=zdnet.com |access-date=February 15, 2022}}</ref>
A 2022 Trellix report stated that hackers are using [[Microsoft OneDrive]] in an espionage campaign against government officials in Western Asia. The malware, named by Trellix as Graphite, employs [[Microsoft Graph]] to use OneDrive as a command and control server and execute the malware. The attack is split into multiple stages to remain hidden for as long as possible.<ref>{{cite web |title=Trellix finds OneDrive malware targeting government officials in Western Asia |url=https://www.zdnet.com/article/trellix-finds-onedrive-malware-campaign-targeting-govt-officials-in-western-asia/ |website=[[ZDNet]] |access-date=February 15, 2022}}</ref>


==Acquisitions==
==Acquisitions==
Line 123: Line 127:
|[[Mandiant]]
|[[Mandiant]]
|Information security
|Information security
|$1bn
|$1 billion
|<ref>{{cite news | title = FireEye Computer Security Firm Acquires Mandiant | url = https://www.nytimes.com/2014/01/03/technology/fireeye-computer-security-firm-acquires-mandiant.html | work = The New York Times | first1 = Nicole | last1 = Perlroth | first2 = David E. | last2 = Sanger | date = January 2, 2014}}</ref>
|<ref>{{cite news | title = FireEye Computer Security Firm Acquires Mandiant | url = https://www.nytimes.com/2014/01/03/technology/fireeye-computer-security-firm-acquires-mandiant.html | work = The New York Times | first1 = Nicole | last1 = Perlroth | first2 = David E. | last2 = Sanger | date = January 2, 2014}}</ref>
|-
|-
Line 129: Line 133:
|nPulse Technologies
|nPulse Technologies
|Information security
|Information security
|$60M
|$60 million
|<ref>{{cite web | last = Miller | first = Ron | date = May 8, 2014 | website = TechCrunch | url = https://techcrunch.com/2014/05/06/fireeye-buys-npulse-technologies-for-60m-to-beef-up-network-security-suite/ | title = FireEye Buys nPulse Technologies For $60M+ To Beef Up Network Security Suite}}</ref>
|<ref>{{cite web | last = Miller | first = Ron | date = May 8, 2014 | website = TechCrunch | url = https://techcrunch.com/2014/05/06/fireeye-buys-npulse-technologies-for-60m-to-beef-up-network-security-suite/ | title = FireEye Buys nPulse Technologies For $60M+ To Beef Up Network Security Suite}}</ref>
|-
|-
Line 135: Line 139:
|iSight Partners
|iSight Partners
|Cyber Threat Intelligence
|Cyber Threat Intelligence
|$275M
|$275 million
|<ref>{{Cite web|url=https://investors.fireeye.com/news-releases/news-release-details/fireeye-announces-acquisition-global-threat-intelligence-leader|title=FireEye Announces Acquisition of Global Threat Intelligence Leader iSIGHT Partners &#124; FireEye|website=investors.fireeye.com}}</ref>
|<ref>{{Cite web|url=https://investors.fireeye.com/news-releases/news-release-details/fireeye-announces-acquisition-global-threat-intelligence-leader|title=FireEye Announces Acquisition of Global Threat Intelligence Leader iSIGHT Partners &#124; FireEye|website=investors.fireeye.com|access-date=December 9, 2020|archive-date=November 8, 2020|archive-url=https://web.archive.org/web/20201108161534/https://investors.fireeye.com/news-releases/news-release-details/fireeye-announces-acquisition-global-threat-intelligence-leader|url-status=dead}}</ref>
|-
|-
|February 2016
|February 2016
Line 148: Line 152:
|Email Security
|Email Security
|
|
|<ref>{{Cite web | url = https://www.fireeye.com/blog/products-and-services/2018/04/the-future-is-bright-for-fireeye-email-security.html | title = The Future is Bright for FireEye Email Security | website = FireEye|access-date=July 12, 2018}}</ref>
|<ref>{{Cite web | url = https://www.fireeye.com/blog/products-and-services/2018/04/the-future-is-bright-for-fireeye-email-security.html | title = The Future is Bright for FireEye Email Security | website = FireEye | access-date = July 12, 2018 | archive-date = July 12, 2018 | archive-url = https://web.archive.org/web/20180712124024/https://www.fireeye.com/blog/products-and-services/2018/04/the-future-is-bright-for-fireeye-email-security.html | url-status = dead }}</ref>
|-
|-
|January 2018
|January 2018
|X15 Software
|X15 Software
|Machine and Log Data Management
|Machine and Log Data Management
| $15 million in equity and $5 million in cash
| $15M in equity and $5M in cash
|<ref>{{Cite web | url = https://www.fireeye.com/company/press-releases/2018/FireEye_Announces_Acquisition_of_X15_Software.html | title = FireEye Announces Acquisition of X15 Software | website = FireEye}}</ref>
|<ref>{{Cite web | url = https://www.fireeye.com/company/press-releases/2018/FireEye_Announces_Acquisition_of_X15_Software.html | title = FireEye Announces Acquisition of X15 Software | website = FireEye}}</ref>
|-
|-
Line 159: Line 163:
|Verodin, Inc.
|Verodin, Inc.
|Security Instrumentation
|Security Instrumentation
| Approximately $250 million in cash and stock
| Approximately $250M in cash and stock
|<ref>{{Cite web | url = https://www.fireeye.com/company/press-releases/2019/fireeye-acquires-security-instrumentation-leader-verodin.html | title = FireEye Acquires Security Instrumentation Leader Verodin | website = FireEye}}</ref>
|<ref>{{Cite web | url = https://www.fireeye.com/company/press-releases/2019/fireeye-acquires-security-instrumentation-leader-verodin.html | title = FireEye Acquires Security Instrumentation Leader Verodin | website = FireEye | access-date = May 28, 2019 | archive-date = May 28, 2019 | archive-url = https://web.archive.org/web/20190528211434/https://www.fireeye.com/company/press-releases/2019/fireeye-acquires-security-instrumentation-leader-verodin.html | url-status = dead }}</ref>
|-
|-
|January 2020
|January 2020
|Cloudvisory
|Cloudvisory
|Cloud Security
|Cloud Security
| $13.2 million in cash
| $13.2M in cash
|<ref>{{Cite web | url = https://www.fireeye.com/company/press-releases/2020/fireeye-acquires-cloudvisory.html | title = FireEye Acquires Cloudvisory | website = FireEye}}</ref><ref>{{cite web | title = SEC Form 10-Q, quarter ended March 31, 2020 | url = https://investors.fireeye.com/static-files/23e0413c-3f33-4d24-9eb3-85505eff8ce7 | website = FireEye | format = PDF | pages = 8 | date = 2020-05-01}}</ref>
|<ref>{{Cite web | url = https://www.fireeye.com/company/press-releases/2020/fireeye-acquires-cloudvisory.html | title = FireEye Acquires Cloudvisory | website = FireEye}}</ref><ref>{{cite web | title = SEC Form 10-Q, quarter ended March 31, 2020 | url = https://investors.fireeye.com/static-files/23e0413c-3f33-4d24-9eb3-85505eff8ce7 | website = FireEye | format = PDF | pages = 8 | date = 2020-05-01 | access-date = April 27, 2021 | archive-date = November 29, 2020 | archive-url = https://web.archive.org/web/20201129072356/https://investors.fireeye.com/static-files/23e0413c-3f33-4d24-9eb3-85505eff8ce7 | url-status = dead }}</ref>
|-
|-
|November 2020
|November 2020
|Respond Software
|Respond Software
|Decision Automation
|Decision Automation
| Approximately $186 million in cash and stock
| Approximately $186M in cash and stock
|<ref>{{Cite web | url = https://www.fireeye.com/company/press-releases/2020/fireeye-announces-acquisition-of-respond-software.html | title = FireEye Announces Acquisition of Respond Software | website = FireEye}}</ref>
|<ref>{{Cite web | url = https://www.fireeye.com/company/press-releases/2020/fireeye-announces-acquisition-of-respond-software.html | title = FireEye Announces Acquisition of Respond Software | website = FireEye}}</ref>
|-
|-
Line 180: Line 184:


==External links==
==External links==
* {{official website|https://www.trellix.com/ }}
* {{commons category-inline}}
* {{official|https://www.trellix.com/ }}


[[Category:Computer security companies specializing in botnets]]
[[Category:Computer security companies specializing in botnets]]
[[Category:Computer companies of the United States]]
[[Category:Technology companies of the United States]]
[[Category:Companies based in Milpitas, California]]
[[Category:Companies based in Milpitas, California]]
[[Category:Computer forensics]]
[[Category:Computer forensics]]

Latest revision as of 08:16, 22 November 2024

Trellix
Company typePrivate
IndustryComputer security
Founded2022; 2 years ago (2022)
HeadquartersMilpitas, California, United States
Key people
Bryan Palma (CEO)
ProductsCyber Security Hardware and Software
  • Email Security
  • Endpoint Security
  • File Security
  • Cross Vendor Management Interface
ServicesIT Security Consulting Services
  • Incident Response
  • Vulnerability Testing
  • Preparedness Assessment
RevenueIncrease US$940 million (2020)[1]
Total assetsIncrease US$3.245 billion (2020)[1]
Total equityIncrease US$732 million (2020)[1]
OwnerSymphony Technology Group
Number of employees
~3,400 (December 2020)[1]
Websitetrellix.com

Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company that was founded in 2022. It has been involved in the detection and prevention of major cybersecurity attacks. It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks.[2]

In March 2021, Symphony Technology Group (STG) announced its acquisition of McAfee Enterprise in an all-cash transaction for US$4.0 billion.[3] STG completed the acquisition of McAfee’s Enterprise business in July 2021 with plans for re-branding.[4] In June 2021, FireEye sold its name and products business to STG for $1.2bn.[5] STG combined FireEye with its acquisition of McAfee's enterprise business to launch Trellix, an extended detection and response (XDR) company.[6] Meanwhile, McAfee Enterprise's security service edge (SSE) business would operate as a separate company to be known as Skyhigh Security.[7]

History

[edit]

FireEye was founded in 2004 by Ashar Aziz, a former Sun Microsystems engineer.[2][8] FireEye's first commercial product was not developed and sold until 2010.[9] Initially, FireEye focused on developing virtual machines to download and test internet traffic before transferring it to a corporate or government network.

In December 2012, founder Aziz stepped down as CEO and former McAfee CEO David DeWalt was appointed to the position[10][11][12] to prepare the company for an initial public offering (IPO).[9][13] The following year, FireEye raised an additional $50 million in venture capital, bringing its total funding to $85M.[14][15] In late 2013, FireEye went public, raising $300M.[11] FireEye remained public until 2021.[5]

In December 2013, FireEye acquired Mandiant for $1bn.[16] Mandiant was a private company founded in 2004 by Kevin Mandia that provided incident response services in the event of a data security breach.[16][17] Mandiant was known for investigating high-profile hacking groups.[16] Before the acquisition, FireEye would often identify a security breach, then partner with Mandiant to investigate who the hackers were.[16] Mandiant became a subsidiary of FireEye.[16] Since acquiring Mandiant, FireEye has been called in to investigate high-profile attacks against Target, JP Morgan Chase, Sony Pictures, Anthem, and others.[18]

The company diversified over time, in part through acquisitions. In 2010, FireEye expanded into the Middle East[19] and the Asian Pacific[20] FireEye entered Europe in 2011[21] and Africa in 2013.[22] At the time, FireEye was growing rapidly:revenues multiplied eight-fold between 2010 and 2012.[11] However, FireEye was not yet profitable, due to high operating costs such as research and development expenses.[11]

In late 2014, FireEye initiated a secondary offering, selling another $1.1bn in shares, to fund the development of a wider range of products.[23] Shortly afterward, FireEye acquired high-speed packet capture company, nPulse, for approximately $60M.[24] By 2015, FireEye was making more than $100M in annual revenue, but was still unprofitable,[25] largely due to research and development overspending.[8]

In January 2016, FireEye acquired iSIGHT Partners for $275M.[26] iSIGHT was a threat intelligence company[27] that gathered information about hacker groups and other cybersecurity risks.[28] This was followed by the acquisition of Invotas, an IT security automation company.[29][30] DeWalt stepped down as CEO in 2016 and was replaced by Mandiant CEO and former FireEye President Kevin Mandia.[10][8] Afterwards, there was downsizing and restructuring in response to lower-than-expected sales, resulting in a layoff of 300–400 employees.[31][32] Profit and revenue increased on account of shifts to a subscription model and lower costs.[33]

In March 2021, Symphony Technology Group (STG) acquired McAfee Enterprise for $4bn.[34] In June 2021, FireEye announced the sale of its products business and name to STG for $1.2 bn.[5] The sale split off its cyber forensics unit, Mandiant,[35] and the FireEye stock symbol FEYE was relaunched as MNDT on the NASDAQ on October 5, 2021.[36] On January 18, 2022, STG announced the launch of Trellix, an extended detection and response company, which is a combination of FireEye and the McAfee enterprise business.[6] On September 30, 2021, STG announced Bryan Palma as CEO of the combined company.[37]

Products and services

[edit]

FireEye started with "sandboxing",[38] in which incoming network traffic is opened within a virtual machine to test it for malicious software before being introduced into the network.[16][25] FireEye's products diversified over time, in part through acquisitions.[10][38] In 2017, FireEye transitioned from primarily selling appliances, to a software-as-a-service model.[39]

FireEye sells technology products including network, email, and endpoint security, a platform for managing security operations centers called Helix, and consulting services primarily based on incident response and threat intelligence products.[40][41]

The Central Management System (CMS) consolidates the management, reporting, and data sharing of Web MPS (Malware Protection System), Email MPS, File MPS, and Malware Analysis System (MAS) into a single network-based appliance by acting as a distribution hub for malware security intelligence.[42]

The FireEye Cloud crowd-sources Dynamic Threat Intelligence (DTI) detected by individual FireEye MPS appliances and automatically distributes this time-sensitive zero-day intelligence globally to all subscribed customers in frequent updates. Content Updates include a combination of DTI and FireEye Labs generated intelligence identified through research efforts.

As of its inception in January 2022, Trellix has more than 40,000 customers, 5,000 employees, and $2bn in annual revenue.[6] Trellix includes the endpoint, cloud, collaboration, data and user, application, and infrastructure security capabilities of FireEye and McAfee.[6] The business focuses on threat detection and response using machine learning and automation, with security technology that can learn and adapt to combat advanced threats.[34]

Operations

[edit]

FireEye has been known for uncovering high-profile hacking groups.[10]

2008–2014

[edit]

In October/November 2009, FireEye participated to take down the Mega-D botnet (also known as Ozdok).[43] On March 16, 2011, the Rustock botnet was taken down through action by Microsoft, US federal law enforcement agents, FireEye, and the University of Washington.[44] In July 2012, FireEye was involved in the analysis[45] of the Grum botnet's command and control servers located in the Netherlands, Panama, and Russia.[46]

In 2013, Mandiant (before being acquired by FireEye) uncovered a multi-year espionage effort by a Chinese hacking group called APT1.[47]

In 2014, the FireEye Labs team identified two new zero-day vulnerabilities – CVE-2014–4148 and CVE-2014–4113 – as part of limited, targeted attacks against major corporations. Both zero-days exploit the Windows kernel. Microsoft addressed the vulnerabilities in the October 2014 Security Bulletin.[48] Also in 2014, FireEye provided information on a threat group it calls FIN4. FIN4 appears to conduct intrusions that are focused on a single objective: obtaining access to insider information capable of making or breaking the stock prices of public companies.

The group has targeted hundreds of companies and specifically targets the emails of corporate-level executives, legal counsel, regulatory personnel, and individuals who would regularly discuss market-moving information.[49] Also in 2014, FireEye released a report focused on a threat group it refers to as APT28. APT28 focuses on collecting intelligence that would be most useful to a government. FireEye found that since at least 2007, APT28 has been targeting privileged information related to governments, militaries, and security organizations that would likely benefit the Russian government.[50]

2015

[edit]

In 2015, FireEye confirmed the existence of at least 14 router implants spread across four different countries: Ukraine, the Philippines, Mexico, and India. Referred to as SYNful Knock, the implant is a stealthy modification of the router’s firmware image that can be used to maintain persistence within a victim’s network.[51]

In September 2015, FireEye obtained an injunction against a security researcher attempting to report vulnerabilities in FireEye Malware Protection System.[52]

In 2015, FireEye uncovered an attack exploiting two previously unknown vulnerabilities, one in Microsoft Office (CVE-2015–2545) and another in Windows (CVE-2015–2546). The attackers hid the exploit within a Microsoft Word document (.docx) that appeared to be a résumé. The combination of these two exploits grants fully privileged remote code execution. Both vulnerabilities were patched by Microsoft.[53]

In 2015, the FireEye as a Service team in Singapore uncovered a phishing campaign exploiting an Adobe Flash Player zero-day vulnerability (CVE-2015–3113). Adobe released a patch for the vulnerability with an out-of-band security bulletin. FireEye attributed the activity to a China-based threat group it tracks as APT3.[54]

2016

[edit]

In 2016, FireEye announced that it had been tracking a pair of cybercriminals referred to as the “Vendetta Brothers.” The company said that the enterprising duo uses various strategies to compromise point-of-sale systems, steal payment card information, and sell it on their underground marketplace “Vendetta World.”[55] In mid-2016, FireEye released a report on the impact of the 2015 agreement between former U.S. President Barack Obama and China's paramount leader Xi Jinping that neither government would “conduct or knowingly support cyber-enabled theft of intellectual property” for economic advantage.

The security firm reviewed the activity of 72 groups that it suspects are operating in China or otherwise support Chinese state interests and determined that, as of mid-2014, there was an overall decrease in successful network compromises by China-based groups against organizations in the U.S. and 25 other countries.[56]

In 2016, FireEye announced that it had identified several versions of an ICS-focused malware – dubbed IRON GATE – crafted to manipulate a specific industrial process running within a simulated Siemens control system environment. Although Siemens Product Computer Emergency Readiness Team (ProductCERT) confirmed to FireEye that IRON GATE is not viable against operational Siemens control systems and that IRON GATE does not exploit any vulnerabilities in Siemens products, the security firm said that IRON GATE invokes ICS attack concepts first seen in Stuxnet.[57]

On May 8, 2016, FireEye detected an attack exploiting a previously unknown vulnerability in Adobe Flash Player (CVE-2016–4117). The security firm reported the issue to the Adobe Product Security Incident Response Team (PSIRT) and Adobe released a patch for the vulnerability just four days later.[58]

In 2016, FireEye discovered a widespread vulnerability affecting Android devices that permit local privilege escalation to the built-in user “radio”, making it so an attacker can potentially perform activities such as viewing the victim’s SMS database and phone history. FireEye reached out to Qualcomm in January 2016 and subsequently worked with the Qualcomm Product Security Team to address the issue.[59]

In 2016, FireEye provided details on FIN6, a cybercriminal group that steals payment card data for monetization from targets predominately in the hospitality and retail sectors. The group was observed aggressively targeting and compromising point-of-sale (POS) systems, and making off millions of payment card numbers that were later sold on an underground marketplace.[60]

2017–2019

[edit]

In 2017, FireEye detected malicious Microsoft Office RTF documents leveraging a previously undisclosed vulnerability, CVE-2017-0199. This vulnerability allows a malicious actor to download and execute a Visual Basic script containing PowerShell commands when a user opens a document containing an embedded exploit. FireEye shared the details of the vulnerability with Microsoft and coordinated public disclosure timed with the release of a patch by Microsoft to address the vulnerability.[61]

In 2018, FireEye helped Facebook identify 652 fake accounts.[62]

2020–2021

[edit]

FireEye revealed on Tuesday, December 8, 2020, that its systems were pierced by what it called "a nation with top-tier offensive capabilities".[63] The company said the attackers used "novel techniques" to steal copies of FireEye's red team tool kit, which the attackers could potentially use in other attacks.[64][65] The same day, FireEye published countermeasures against the tools that had been stolen.[66][67]

A week later in December 2020, FireEye reported the SolarWinds supply chain attack to the U.S. National Security Agency (NSA), the federal agency responsible for defending the U.S. from cyberattacks, and said its tools were stolen by the same actors. The NSA is not known to have been aware of the attack before being notified by FireEye. The NSA uses SolarWinds software itself.[68]

Within a week of FireEye's breach, cyber-security firm McAfee said the stolen tools had been used in at least 19 countries, including the US, the UK, Ireland, the Netherlands, and Australia.[69]

During the continued investigation of the hack of their data and that of federal agencies revealed on December 8, 2020, FireEye reported in early January that the hacks originated from inside the USA, sometimes very close to the facilities affected, which enabled the hackers to evade surveillance by the National Security Agency and the defenses used by the Department of Homeland Security.[70]

2022

[edit]

A 2022 report by Trellix noted that hacking groups Wicked Panda (linked to China) and Cozy Bear (linked to Russia) were behind 46% of all state-sponsored hacking campaigns in the third quarter of 2021 and that in a third of all state-sponsored cyber attacks, the hackers abused Cobalt Strike security tools to get access to the victim's network.[71] In a January 2022 report on Fox News, Trellix CEO Bryan Palma stated that there is an increasing level of cyberwarfare threats from Russia and China.[72]

A 2022 Trellix report stated that hackers are using Microsoft OneDrive in an espionage campaign against government officials in Western Asia. The malware, named by Trellix as Graphite, employs Microsoft Graph to use OneDrive as a command and control server and execute the malware. The attack is split into multiple stages to remain hidden for as long as possible.[73]

Acquisitions

[edit]
Announcement date Company Business Deal size References
December 30, 2013 Mandiant Information security $1bn [74]
May 8, 2014 nPulse Technologies Information security $60M [75]
January 2016 iSight Partners Cyber Threat Intelligence $275M [76]
February 2016 Invotas Security Orchestration [77]
October 2017 The Email Laundry Email Security [78]
January 2018 X15 Software Machine and Log Data Management $15M in equity and $5M in cash [79]
May 2019 Verodin, Inc. Security Instrumentation Approximately $250M in cash and stock [80]
January 2020 Cloudvisory Cloud Security $13.2M in cash [81][82]
November 2020 Respond Software Decision Automation Approximately $186M in cash and stock [83]

References

[edit]
  1. ^ a b c d "FireEye, Inc. 2020 Annual Report (Form 10-K)". last10k.com. U.S. Securities and Exchange Commission. February 2021.
  2. ^ a b Springer, P.J. (2017). Encyclopedia of Cyber Warfare. ABC-CLIO. p. 109. ISBN 978-1-4408-4425-6. Retrieved September 18, 2018.
  3. ^ "McAfee Announces Sale of Enterprise Business to Symphony Technology Group for $4.0 Billion". stgpartners.com. March 8, 2021. Retrieved April 20, 2022.
  4. ^ "Symphony Technology Group Closes Acquisition of McAfee's Enterprise Business". stgpartners.com. July 28, 2021. Retrieved April 20, 2022.
  5. ^ a b c "FireEye is selling its products business and name for $1.2 billion". cnbc.com. June 2, 2021. Retrieved February 8, 2022.
  6. ^ a b c d "McAfee Enterprise and FireEye combo is now Trellix". itworldcanada.com. January 27, 2022. Retrieved February 8, 2022.
  7. ^ "McAfee Enterprise cloud security biz relaunches as Skyhigh". venturebeat.com. March 22, 2022. Retrieved July 12, 2022.
  8. ^ a b c Anderson, Mae (August 24, 2018). "FireEye is tech firms' weapon against disinformation, staffed with 'the Navy SEALs of cyber security'". latimes.com. Retrieved September 18, 2018.
  9. ^ a b "FireEye shares double as hot security firm goes public". USA TODAY. September 20, 2013. Retrieved September 22, 2018.
  10. ^ a b c d Hackett, Robert (May 6, 2016). "FireEye Names New CEO". Fortune. Retrieved September 18, 2018.
  11. ^ a b c d Owens, Jeremy C.; Delevett, Peter (September 20, 2013). "FireEye's price more than doubles on Wall Street after eye-popping IPO". The Mercury News. Retrieved September 22, 2018.
  12. ^ "FireEye names former McAfee exec Dave DeWalt as CEO, plans IPO". Reuters. November 28, 2012. Retrieved September 18, 2018.
  13. ^ Kelly, Meghan (August 5, 2013). "FireEye brings more legitimacy to new security solutions with IPO filing". VentureBeat. Retrieved September 22, 2018.
  14. ^ Westervelt, Robert (January 10, 2013). "FireEye Scores $50M Funding, Beefs Up Executive Team". CRN. Retrieved September 22, 2018.
  15. ^ Bort, Julie (January 10, 2013). "Now Worth $1.25 Billion, FireEye Is The Next Hot Enterprise Startup To Watch". Business Insider. Retrieved September 22, 2018.
  16. ^ a b c d e f Perlroth, Nicole; Sanger, David (January 3, 2014). "FireEye Computer Security Firm Acquires Mandiant". The New York Times. Retrieved September 18, 2018.
  17. ^ "FireEye Buys Mandiant For $1 Billion In Huge Cyber Security Merger". Business Insider. Reuters. January 2, 2014. Retrieved September 22, 2018.
  18. ^ "FireEye has become Go-to Company for Breaches". USA Today. Retrieved May 21, 2015.
  19. ^ Enzer, Georgina. "FireEye Inc steps into the Middle East". ITP.net. Retrieved September 18, 2018.
  20. ^ "Security Watch: FireEye appoints first ever Asia Pac president". CSO. November 15, 2018. Retrieved November 15, 2018.
  21. ^ Brewster, Tom (March 17, 2011). "FireEye looks to break into UK". IT PRO. Retrieved September 18, 2018.
  22. ^ Doyle, Kirsten (August 7, 2013). "FireEye opens local office". ITWeb. Retrieved September 22, 2018.
  23. ^ de la Merced, Michael J. (March 10, 2014). "With Its Stock Riding High, FireEye Sells More Shares for $1.1 Billion". DealBook. Retrieved September 22, 2018.
  24. ^ Miller, Ron (May 6, 2014). "FireEye Buys nPulse Technologies For $60M+ To Beef Up Network Security Suite". TechCrunch. Retrieved September 18, 2018.
  25. ^ a b Weise, Elizabeth (May 20, 2015). "FireEye has become go-to company for breaches". USA TODAY. Retrieved September 18, 2018.
  26. ^ Finkle, Jim (January 20, 2016). "FireEye buys cyber intelligence firm iSight Partners for $200 million". U.S. Retrieved September 22, 2018.
  27. ^ Hackett, Robert (January 20, 2016). "FireEye Makes a Big Acquisition". Fortune. Retrieved September 22, 2018.
  28. ^ Kuchler, Hannah (January 20, 2016). "FireEye bulks up for 'cyber arms race'". Financial Times. Retrieved September 22, 2018.
  29. ^ Morgan, Steve (February 2, 2016). "FireEye acquires Invotas; Who's next?". CSO Online. Retrieved September 22, 2018.
  30. ^ Beckerman, Josh (February 2, 2016). "FireEye Buys Invotas International". WSJ. Retrieved September 22, 2018.
  31. ^ Wieczner, Jen (August 5, 2016). "What FireEye's Stock Crash Says About Hacking". Fortune. Retrieved September 22, 2018.
  32. ^ Owens, Jeremy C. (August 4, 2016). "FireEye plans layoffs as new CEO takes the helm, stock plunges". MarketWatch. Retrieved September 22, 2018.
  33. ^ Sharma, Vibhuti (October 30, 2018). "FireEye earnings boosted by lower costs, higher subscriptions". Reuters. Retrieved November 15, 2018.
  34. ^ a b "McAfee Enterprise and FireEye are now called Trellix". ZDNet. Retrieved February 8, 2022.
  35. ^ "FireEye Announces Sale of FireEye Products Business to Symphony Technology Group for $1.2 Billion". FireEye. Retrieved June 10, 2021.
  36. ^ FireEye's press release Archived October 19, 2021, at the Wayback Machine about relaunch of Mandiant in NASDAQ
  37. ^ Symphony Technology Group Announces Bryan Palma Appointment
  38. ^ a b Oltsik, Jon (October 15, 2015). "FireEye Myth and Reality". CSO Online. Retrieved September 18, 2018.
  39. ^ "Cybersecurity Firm FireEye's Revenue Beats Street". Fortune. July 1, 2017. Retrieved September 22, 2018.
  40. ^ Casaretto, John (February 14, 2014). "FireEye launches a new platform and details Mandiant integration". SiliconANGLE. Retrieved September 22, 2018.
  41. ^ Kuranda, Sarah (November 30, 2016). "FireEye Brings Together Security Portfolio Under New Helix Platform". CRN. Retrieved September 22, 2018.
  42. ^ "FireEye Forecasts Downbeat Results for Current Quarter; Shares Tumble (NASDAQ:FEYE) – Sonoran Weekly Review". Sonoran Weekly Review. May 6, 2016. Archived from the original on August 10, 2016. Retrieved May 6, 2016.
  43. ^ Cheng, Jacqui (November 11, 2009). "Researchers' well-aimed stone takes down Goliath botnet". Ars Technica. Retrieved November 30, 2009.
  44. ^ Wingfield, Nick (March 18, 2011). "Spam Network Shut Down". Wall Street Journal. Retrieved March 18, 2011.
  45. ^ "FireEye Blog | Threat Research, Analysis, and Mitigation". Blog.fireeye.com. Archived from the original on January 31, 2013. Retrieved April 12, 2014.
  46. ^ "Cybercriminals no longer control Grum botnet, researchers say". computerworld.com. July 19, 2012. Retrieved February 15, 2022.
  47. ^ Sanger, David E.; Barboza, David; Perlroth, Nicole (February 18, 2013). "China's Army Is Seen as Tied to Hacking Against U.S." The New York Times. Retrieved October 15, 2018.
  48. ^ "Microsoft Security Bulletin Summary for October 2014". Microsoft. Retrieved June 21, 2017.
  49. ^ Sullivan, Gail (December 2, 2014). "Report: 'FIN4' hackers are gaming markets by stealing insider info". Washington Post. Retrieved June 21, 2017.
  50. ^ Fox-Brewster, Tom (October 29, 2014). "'State sponsored' Russian hacker group linked to cyber attacks on neighbours". The Guardian.
  51. ^ Leyden, John (September 15, 2015). "Compromised Cisco routers spotted bimbling about in the wild". The Register. Retrieved June 21, 2017.
  52. ^ Goodin, Dan (September 11, 2015). "Security company litigates to bar disclosure related to its flaws". ArsTechnica. Retrieved September 12, 2015.
  53. ^ "Acknowledgments – 2015". Microsoft. Retrieved June 21, 2017.
  54. ^ "Security updates available for Adobe Flash Player". Adobe. Retrieved June 21, 2017.
  55. ^ Korolov, Maria (September 29, 2016). "Diversified supply chain helps 'Vendetta Brothers' succeed in criminal business". CSO. Retrieved June 21, 2017.
  56. ^ Hackett, Robert (June 25, 2016). "China's Cyber Spying on the U.S. Has Drastically Changed". Fortune. Retrieved June 21, 2017.
  57. ^ Cox, Joseph (June 2, 2016). "There's a Stuxnet Copycat, and We Have No Idea Where It Came From". Motherboard. Retrieved June 21, 2017.
  58. ^ "Security updates available for Adobe Flash Player". Adobe. Retrieved June 21, 2017.
  59. ^ Goodin, Dan (May 5, 2016). "Critical Qualcomm security bug leaves many phones open to attack". Ars Technica. Retrieved June 21, 2017.
  60. ^ Taylor, Harriet (April 20, 2016). "What one criminal gang does with stolen credit cards". CNBC. Retrieved June 21, 2017.
  61. ^ "CVE-2017-0199 Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API". Microsoft. Retrieved June 21, 2017.
  62. ^ Conger, Kate; Frenkel, Sheera (August 23, 2018). "How FireEye Helped Facebook Spot a Disinformation Campaign". The New York Times. Retrieved September 22, 2018.
  63. ^ "FireEye hacked, red team tools stolen". December 8, 2020.
  64. ^ Sanger, David E.; Perlroth, Nicole (December 8, 2020). "FireEye, a Top Cybersecurity Firm, Says It Was Hacked by a Nation-State". The New York Times.
  65. ^ agencies, Guardian staff and (December 9, 2020). "US cybersecurity firm FireEye says it was hacked by foreign government". the Guardian.
  66. ^ Newman, Lily Hay. "Russia's FireEye Hack Is a Statement—but Not a Catastrophe". Wired. Archived from the original on December 16, 2020. Retrieved December 17, 2020 – via www.wired.com.
  67. ^ "fireeye/red_team_tool_countermeasures". GitHub. Retrieved December 17, 2020.
  68. ^ Sanger, David E.; Perlroth, Nicole; Schmitt, Eric (December 15, 2020). "Scope of Russian Hack Becomes Clear: Multiple U.S. Agencies Were Hit". The New York Times.
  69. ^ "SolarWinds Orion: More US government agencies hacked". BBC News. December 15, 2020. Retrieved December 17, 2020.
  70. ^ Allen, Mike, Russia hacked from inside U.S., Axios, January 3, 2021
  71. ^ "Bracing for cyber-spying at the Olympics". politico.com. Retrieved February 15, 2022.
  72. ^ "Russia and China ramping up cyber threats: Trellix CEO". foxnews.com. Retrieved February 15, 2022.
  73. ^ "Trellix finds OneDrive malware targeting government officials in Western Asia". ZDNet. Retrieved February 15, 2022.
  74. ^ Perlroth, Nicole; Sanger, David E. (January 2, 2014). "FireEye Computer Security Firm Acquires Mandiant". The New York Times.
  75. ^ Miller, Ron (May 8, 2014). "FireEye Buys nPulse Technologies For $60M+ To Beef Up Network Security Suite". TechCrunch.
  76. ^ "FireEye Announces Acquisition of Global Threat Intelligence Leader iSIGHT Partners | FireEye". investors.fireeye.com. Archived from the original on November 8, 2020. Retrieved December 9, 2020.
  77. ^ "FireEye Announces Acquisition of Invotas International Corporation (None:FEYE)". investors.fireeye.com. Archived from the original on March 27, 2016. Retrieved January 13, 2022.
  78. ^ "The Future is Bright for FireEye Email Security". FireEye. Archived from the original on July 12, 2018. Retrieved July 12, 2018.
  79. ^ "FireEye Announces Acquisition of X15 Software". FireEye.
  80. ^ "FireEye Acquires Security Instrumentation Leader Verodin". FireEye. Archived from the original on May 28, 2019. Retrieved May 28, 2019.
  81. ^ "FireEye Acquires Cloudvisory". FireEye.
  82. ^ "SEC Form 10-Q, quarter ended March 31, 2020". FireEye. May 1, 2020. p. 8. Archived from the original (PDF) on November 29, 2020. Retrieved April 27, 2021.
  83. ^ "FireEye Announces Acquisition of Respond Software". FireEye.
[edit]