{"id":6405,"date":"2020-12-10T09:14:47","date_gmt":"2020-12-10T08:14:47","guid":{"rendered":"https:\/\/webhosting.de\/?p=6405"},"modified":"2020-12-10T09:14:49","modified_gmt":"2020-12-10T08:14:49","slug":"hacking-tools-the-security-enterprise-brandstichting-gestolen","status":"publish","type":"post","link":"https:\/\/webhosting.de\/nl\/hacking-werkzeuge-des-security-unternehmens-fireeye-gestohlen\/","title":{"rendered":"Hacking tools gestolen van beveiligingsbedrijf Fireeye"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Volgens een persbericht van <a href=\"https:\/\/www.fireeye.com\/blog\/products-and-services\/2020\/12\/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Fireeye<\/a> Onbekende hackers hebben onlangs tools gestolen van het beveiligingsbedrijf dat Fireeye gebruikt om de verdediging van haar klanten te testen. Tot de klanten van het bedrijf behoren Amerikaanse overheidsinstellingen en andere bedrijven die het doelwit zijn geweest van IT-aanvallen of die hun bescherming willen verbeteren.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Fireeye legt uit dat er tot nu toe geen bewijs is dat het gestolen gereedschap is gebruikt voor verdere hackersaanvallen. Om zo snel mogelijk tegenmaatregelen te kunnen nemen, wil Fireeye volgens het bedrijf transparante informatie geven over de gebruikte hackingtools en de gebruikte beveiligingsgaten. Dit zou de uitvoering van directe tegenmaatregelen moeten vergemakkelijken. Met de <a href=\"https:\/\/webhosting.de\/nl\/cloudhosting\/\">Cloud Hosting<\/a>-platform <a href=\"https:\/\/github.com\/fireeye\/red_team_tool_countermeasures\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GitHub<\/a> Fireeye heeft al overeenkomstige regels gepubliceerd voor beveiligingstools zoals ClamAV, Yara en Snort.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-ziel-der-hacker-kundendaten-von-fireeye\">Doelwit van de hackers: klantgegevens van Fireeye<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Naast hackingtools probeerden de hackers ook klantgegevens te kopi\u00ebren, volgens de logboeken van Fireeye. Zij waren vooral ge\u00efnteresseerd in de overheidsklanten van het bedrijf. Volgens Fireeye CEO Kevin Mandia wordt nog niet aangenomen dat de aanvallers met succes klantgegevens hebben gestolen.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">De hoge professionaliteit van de aanval en de selectie van <a href=\"https:\/\/webhosting.de\/nl\/personenbezogene-daten-sozialen-netzwerken\/\">Gegevens<\/a> Fireeye zegt dat het wijst op hackers van de overheid. Dit wordt vermoed door de FBI, die het onderzoek is begonnen.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-hacker-aus-russland\">Hackers uit Rusland?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Hoe de <a href=\"https:\/\/www.wsj.com\/articles\/u-s-cyber-firm-fireeye-says-it-was-breached-by-nation-state-hackers-11607461408\" target=\"_blank\" rel=\"noopener\">De Wall Street Journal<\/a> (WSJ) meldt dat de onderzoeksautoriteiten hackers in de buurt van de Russische geheime dienst waarschijnlijk achten. De technische vaardigheden van de aanvallers zijn een indicatie dat de aanval mogelijk is uitgevoerd door de groep die e-mails van Hillary Clinton heeft gestolen in de Amerikaanse verkiezingscampagne van 2016 om de kandidaat van de Democratische Partij te schaden. Als reden voor deze veronderstelling noemen onderzoekers een ongebruikelijke combinatie van hackingtools die al bij de aanval van 2016 werden gebruikt.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>\"De aanvallers hebben hun capaciteiten van wereldklasse speciaal aangepast om Fireeye aan te vallen.\"<\/p><cite>Mandia<\/cite><\/blockquote><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-keine-zeroday-exploits-enthalten\">Geen nul-dagen-uitbuitingen inbegrepen<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Zero-day-exploits zijn niet opgenomen in de gestolen hackingtools, volgens de verklaring van het bedrijf. Een lijst van de gebruikte <a href=\"https:\/\/github.com\/fireeye\/red_team_tool_countermeasures\/blob\/master\/CVEs_red_team_tools.md\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Kwetsbaarheden inclusief CVE-nummers<\/a> zijn inmiddels door Fireeye gepubliceerd. Dit zijn voornamelijk netwerktechnologie van Cisco en ondernemingsproducten zoals VPN's, Confluence en Microsoft-tools zoals Exchange, Active Directory, Outlook en Windows. Om de gestolen aanvalsvectoren te beveiligen, wordt nu prioriteit gegeven aan de volgende kwetsbaarheden <a href=\"https:\/\/webhosting.de\/nl\/taegliche-updates-auf-facebook\/\">Updates<\/a> goed gerepeteerd.<\/p>","protected":false},"excerpt":{"rendered":"<p>Hackers hebben gereedschap gestolen van het beveiligingsbedrijf Fireeye dat gebruikt zou kunnen worden voor verdere aanvallen.<\/p>","protected":false},"author":2,"featured_media":6406,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[685],"tags":[950,951],"class_list":["post-6405","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","tag-fireeye","tag-hacker"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":"685","rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":"685","rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":null,"_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":"1","_edit_lock":"1607958918:2","_oembed_e7b913c6c84084ed9702cb4feb012ddd":"{{unknown}}","_oembed_bfde9e10f59a17b85fc8917fa7edf782":"<iframe title=\"Theming Nextcloud in 37 seconds\" width=\"368\" height=\"207\" src=\"https:\/\/www.youtube.com\/embed\/wqRgeFXYUys?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":"1607588098","_oembed_03514b67990db061d7c4672de26dc514":"<iframe title=\"Gaia X\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/NhqLt_NJ6FA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_03514b67990db061d7c4672de26dc514":"1607588090","rank_math_news_sitemap_robots":"index","rank_math_robots":["index"],"_eael_post_view_count":"4346","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"hacking-tools-of-security-company-fireeye-stolen","_trp_automatically_translated_slug_lv":"hacking-tools-of-security-company-fireeye-stolen","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"hacking-tools-of-security-company-fireeye-stolen","_trp_automatically_translated_slug_ja":"%e3%83%8f%e3%83%83%e3%82%ad%e3%83%b3%e3%82%b0%e3%83%84%e3%83%bc%e3%83%ab%e3%80%81%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e4%bc%81%e6%a5%ad%e3%81%ae%e3%83%95%e3%82%a1%e3%82%a4%e3%82%a2","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":null,"_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_time_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_59808117857ddf57e478a31d79f76e4d":null,"_oembed_time_59808117857ddf57e478a31d79f76e4d":null,"_oembed_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_81002f7ee3604f645db4ebcfd1912acf":"<iframe title=\"Netzetag bei der Telekom: Antennen, Breitband, Glasfaser\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/6_NTa3VCRFo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_81002f7ee3604f645db4ebcfd1912acf":"1607588090","_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":null,"_oembed_time_7ea3429961cf98fa85da9747683af827":null,"_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":["tp-video-player"],"_eael_custom_js":null,"_wp_old_date":"2020-12-09","_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":"503","rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":null,"rank_math_contentai_score":null,"ilj_limitincominglinks":null,"ilj_maxincominglinks":null,"ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":null,"ilj_linkdefinition":[],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":null,"rank_math_og_content_image":null,"_yoast_wpseo_metadesc":"Hacker haben beim Security-Unternehmen Fireeye Tools entwendet, die f\u00fcr weitere Angriffe verwendet werden k\u00f6nnten.","_yoast_wpseo_content_score":"30","_yoast_wpseo_focuskeywords":"[]","_yoast_wpseo_keywordsynonyms":"[\"\"]","_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":"Hacker haben beim Security-Unternehmen Fireeye Tools entwendet, die f\u00fcr weitere Angriffe verwendet werden k\u00f6nnten.","surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"6406","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/nl\/wp-json\/wp\/v2\/posts\/6405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/nl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/nl\/wp-json\/wp\/v2\/comments?post=6405"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/nl\/wp-json\/wp\/v2\/posts\/6405\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/nl\/wp-json\/wp\/v2\/media\/6406"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/nl\/wp-json\/wp\/v2\/media?parent=6405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/nl\/wp-json\/wp\/v2\/categories?post=6405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/nl\/wp-json\/wp\/v2\/tags?post=6405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}