FireEye Red Team Tool Countermeasures (rules for a Snort)
Sergei_Shablovsky last edited by
FireEye Red Team Tool Countermeasures
These rules are provided freely to the community without warranty.
In this GitHub repository you will find rules in multiple languages:
The rules are categorized and labeled into two release states:
Production: rules that are expected to perform with minimal tuning.
Supplemental: rules that are known to require further environment-specific tuning and tweaking to perform, and are often used for hunting workflows.
Please check back to this GitHub for updates to these rules.
FireEye customers can refer to the FireEye Community (community.fireeye.com) for information on how FireEye products detect these threats.
The entire risk as to quality and performance of these rules is with the users.
P.S. If You do not know about FireEye / Solar Wind / Microsoft / US Nuclear Agency BIG HACK from Russian side, read:
«The attackers tailored their world-class capabilities specifically to target and attack FireEye. They are highly trained in operational security and executed with discipline and focus. They operated clandestinely, using methods that counter security tools and forensic examination. They used a novel combination of techniques not witnessed by us or our partners in the past.»