Top cybersecurity firm hit by ‘state-sponsored’ hacking
The IndependentThe latest headlines from our reporters across the US sent straight to your inbox each weekday Your briefing on the latest headlines from across the US Your briefing on the latest headlines from across the US SIGN UP I would like to be emailed about offers, events and updates from The Independent. The stolen malware – so-called "red-team" tools which are used to test customers’ security – could be dangerous in the wrong hands, with cybersecurity experts warning that sophisticated nation-state hackers could deploy them in the future against political or corporate targets. FireEye CEO Kevin Mandia wrote in a blog post: “We were attacked by a highly sophisticated threat actor, one whose discipline, operational security, and techniques lead us to believe it was a state- "I've concluded we are witnessing an attack by a nation with top-tier offensive capabilities," Mr Mandia added, deeming it "different from the tens of thousands of incidents we have responded to throughout the years." The stolen computer kit targets vulnerabilities in popular software products, but Mr Mandia said none of the stolen tools exploited so-called "zero-day vulnerabilities", meaning the relevant flaws should already be in the public domain. The hack was the most significant breach of a major cybersecurity firm since 2016 when a mysterious group known as the "Shadow Brokers" released high-level hacking tools stolen from the National Security Agency.