Mandiant Profile Banner
Mandiant Profile
Mandiant

@Mandiant

Followers
124,815
Following
4,334
Media
3,497
Statuses
9,026
Explore trending content on Musk Viewer
@Mandiant
Mandiant
4 months
As you likely noticed, yesterday, Mandiant lost control of this X account which had 2FA enabled. Currently, there are no indications of malicious activity beyond the impacted X account, which is back under our control. We'll share our investigation findings once concluded.
84
251
1K
@Mandiant
Mandiant
2 years
We are excited to announce that we've signed an agreement to join the @GoogleCloud family — bringing together some of the best minds in security! Read more here:
Tweet media one
21
346
943
@Mandiant
Mandiant
2 years
Google completed its acquisition of Mandiant today. We’re excited to get started on our shared mission to create a comprehensive and best-in-class cyber security solution for customers and partners. Read more here:
Tweet media one
9
233
598
@Mandiant
Mandiant
4 months
We have finished our investigation into last week's Mandiant X account takeover and determined it was likely a brute force password attack, limited to this single account.
90
147
546
@Mandiant
Mandiant
10 years
Mandiant @ RSA USA 2014: Who, What, Where & When #RSA #DFIR #InfoSec http://t.co/BPiXGMtluo
10
156
413
@Mandiant
Mandiant
2 years
New: North Korea has taken a page out of China's cyber playbook to reorganize and consolidate its threat groups within the government - making them “extremely mobile now that they’ve consolidated.” Here's a first look at their new org structure 👇
Tweet media one
2
165
341
@Mandiant
Mandiant
9 months
Mandiant Intelligence has been tracking several ways in which Chinese cyber espionage activity has increasingly leveraged initial access and post-compromise strategies intended to minimize opportunities for detection. Learn more in our analysis:
Tweet media one
1
129
311
@Mandiant
Mandiant
2 years
Linux is becoming a prime target as it is used as the operating system for basic household items up to critical infrastructure. View our latest white paper for guidance on protecting Linux endpoints against malware and destructive attacks. ➡️
Tweet media one
5
119
306
@Mandiant
Mandiant
2 years
Listen to this week’s #ThreatTrends episode feat. Mandiant’s Yihao Lim who joined to discuss the trends he sees in the threat landscape in APJ and how organizations in the region are approaching security. 🎧:
7
17
258
@Mandiant
Mandiant
2 years
Today, the Mandiant Threat Intelligence team shared that it assesses with high confidence that #UNC1151 is linked to the Belarusian govt & that Belarus is likely at least partially responsible for the Ghostwriter IO campaign. Read more on our blog:
3
127
254
@Mandiant
Mandiant
3 months
Mandiant and VMware Product Security found that UNC3886 has been exploiting CVE-2023-20867 since 2021. Mandiant recommends VMware users update to the latest version of vCenter to account for this vulnerability seeing exploitation in the wild. ⬇️
2
95
210
@Mandiant
Mandiant
2 years
Today, we announced the elevation of one of the longest-running financially-motivated threat clusters to FIN status, known as #FIN13 . The group is unique in several ways, including in the fact they do not deploy #ransomware . Learn more ➡️
Tweet media one
2
87
204
@Mandiant
Mandiant
2 years
Today we announced our strategic partnership with @CrowdStrike , which brings the power of CrowdStrike’s Falcon platform to Mandiant’s industry-leading services helping to protect customers from #cyberthreats . Learn more. ⬇️
4
60
193
@Mandiant
Mandiant
15 days
Mandiant reveals that a “hacktivist” persona created by APT44, has recently targeted & disrupted U.S. and Polish water utilities, as well as a French dam. Read more on our latest findings here: #Mandiant #APT44
Tweet media one
2
96
196
@Mandiant
Mandiant
2 years
Based on the data released, there are no indications that Mandiant data has been disclosed. Rather the actor appears to be trying to disprove our June 2nd, 2022 research on UNC2165 and LockBit. We stand behind the findings of this research.
2
69
169
@Mandiant
Mandiant
3 years
It’s time for our home race🏁! We are proud to provide @AlpineF1Team with confidence in their #cybersecurity as they take on the #USGP at Circuit of the Americas. Let’s go team, good luck!
Tweet media one
2
22
163
@Mandiant
Mandiant
2 years
We've posted a new blog authored by Mandiant's Threat Intel team on how the Apache Log4j vulnerability impacts organizations, ways attackers have been leveraging it in the wild and our detailed mitigation recommendations. Read more here:
1
58
164
@Mandiant
Mandiant
2 years
In light of the crisis in Ukraine, Mandiant is preparing for Russian actors to carry out aggressive cyber activity against customers & the community. Read our whitepaper for guidance on how to protect against these sorts of destructive cyber attacks. ➡️
Tweet media one
2
61
157
@Mandiant
Mandiant
11 months
UNC3886 has been exploiting a 0-day vulnerability in VMware ESXi hypervisors. See our latest blog for more on this group, as well as steps organizations can take to detect and respond to a newly exploited 0-day vulnerability in VMware ESXi hypervisors.
0
72
157
@Mandiant
Mandiant
3 years
Today we’ve released a white paper and investigative tool to help orgs detect, protect against, and respond to #UNC2452 , the group behind the SUNBURST malware and supply chain attack. Check out the white paper:
Tweet media one
0
77
157
@Mandiant
Mandiant
2 years
We have graduated UNC788 to APT status. #APT42 is a prolific & well-resourced threat actor likely operating on behalf of the Iranian Revolutionary Guard Corps. Read more on the group & listen to our latest #ThreatTrends episode to learn more.
1
65
149
@Mandiant
Mandiant
2 years
We have developed and launched The Mandiant Cyber Threat Intelligence Analyst Core Competencies Framework to help grow the pool of highly capable CTI practitioners. Read this blog post by @_John_Doyle to learn more. 👇
1
46
148
@Mandiant
Mandiant
3 years
. @FireEye has entered into a definitive agreement to sell the FireEye Products business, including the FireEye name, to Symphony Technology Group. This will separate FireEye’s products suite from Mandiant Solutions’ controls-agnostic software and services.
5
94
149
@Mandiant
Mandiant
1 month
🚀 Unveiling the new Threat Intelligence Blog! Explore hundreds of Mandiant reports, offering the same intelligence and same Mandiant expertise but now on a dedicated page. Read now: #ThreatIntelligence #Cybersecurity
1
50
147
@Mandiant
Mandiant
3 years
Everyone's heard of #CobaltStrike . But do you know how it works? Don't worry. @ramen0x3f has you covered. Read the blog post 👉
0
47
146
@Mandiant
Mandiant
4 months
As part of the Google Summer of Code project, our FLOSS malware analysis tool now supports the Go and Rust executables. Learn how to use FLOSS by reading our blog here #ReverseEngineering #Flare
4
49
143
@Mandiant
Mandiant
6 months
A new Mandiant investigation reveals what’s probably the first instance of an ICS attack that solely uses living off the land techniques. Read how Sandworm caused a power outage in Ukraine and why they could replicate a similar type of attack elsewhere:
2
72
136
@Mandiant
Mandiant
3 years
capa v3 has arrived! 🙌 With help from @IntezerLabs , the tool now recognizes ELF files. Learn more about the extended analysis and other improvements that come with the newest code and ruleset updates, in our latest blog.
1
59
135
@Mandiant
Mandiant
2 years
Our experts have gathered sufficient evidence to assess that the activity tracked as #UNC2452 , the group name used to track the #SolarWinds compromise in December 2020, is attributable to #APT29 . Learn more:
Tweet media one
1
77
136
@Mandiant
Mandiant
4 months
Normally, 2FA would have mitigated this, but due to some team transitions and a change in X’s 2FA policy, we were not adequately protected. We've made changes to our process to ensure this doesn't happen again.
15
22
132
@Mandiant
Mandiant
2 years
We have identified an ongoing IO campaign leveraging a network of at least 72 suspected inauthentic news sites & a number of suspected inauthentic social media assets to disseminate content strategically aligned w/ the political interests of the PRC. ➡️
1
70
125
@Mandiant
Mandiant
2 months
The Mandiant Managed Defense team has been working tirelessly to identify and combat the latest threats, and we're sharing our key observations from 2023 with you.👇 #Cybersecurity #ThreatIntelligence
1
42
129
@Mandiant
Mandiant
4 years
Yesterday we lost former teammate Joyce Lin, who's plane crashed while delivering COVID-19 tests in rural Indonesia. A founding member of the Intel Team, Joyce then followed a passion to give back, joining a nonprofit. Her generosity will be missed.
5
34
126
@Mandiant
Mandiant
1 year
In early 2022, Mandiant detected & responded to an incident where #APT29 successfully phished a European diplomatic entity & ultimately abused the Windows Credential Roaming feature. Read the blog post for more on this research.👇
0
58
126
@Mandiant
Mandiant
2 years
This joint CSA provides details on rare #ICS focused malware that could be used to carry out serious cyber attacks against critical infrastructure. We appreciate acknowledgment for the hard work of our team in the report.
2
39
118
@Mandiant
Mandiant
2 years
We are kicking off the week by releasing free tools on GitHub that help companies generate rules to systematically hunt for deserialization exploits, as well as other types of 0-day exploits. For more, read the blog post by Alyssa Rahman ( @ramen0x3f ). 👉
Tweet media one
2
35
116
@Mandiant
Mandiant
3 years
Ready. Set. Go! 🚦 We are thrilled to announce our strategic partnership with @AlpineF1Team to help protect data across racing operations so they can continue to push the boundaries of technology and innovation both on and off the track. 👉 Read more:
Tweet media one
0
15
115
@Mandiant
Mandiant
2 years
The #MTrends 2022 report is here! Download your copy today to get our insights from the frontlines of #cybersecurity
Tweet media one
0
54
116
@Mandiant
Mandiant
3 months
Our Managed Defense team identified a threat actor, UNC4990, who uses USB devices for initial attacks. They have moved from using seemingly benign encoded text files to hosting payloads on popular websites. Read more: #Malware #ManagedDefense
3
44
113
@Mandiant
Mandiant
3 years
Every industry has defining moments. The APT1 report that came out 8 years ago today is one of those moments for #infosec . Watch the actual APT1 attacker sessions and intrusion activities in the video below. ▶️ Read the APT1 report:
2
46
112
@Mandiant
Mandiant
3 years
We have been engaged by @TMobile to help them become more resilient to future cyber threats, drawing from Mandiant’s global front line experience helping orgs respond to security incidents.
0
33
112
@Mandiant
Mandiant
3 years
We’ve recently responded to several incidents involving compromises of Pulse Secure VPN appliances. Our blog post examines multiple related techniques for bypassing single & multifactor authentication on the appliances. Review the techniques here:
Tweet media one
0
58
111
@Mandiant
Mandiant
3 years
Congrats to everyone who participated in #FLAREOn8 ! 👏 Check out our blog post for more on this year's contest & read the detailed solutions by each challenge author >>
Tweet media one
2
30
108
@Mandiant
Mandiant
3 years
📣 New UNC group alert: UNC1945 📣 We've observed this group compromise telecommunication companies as well as target financial and professional consulting industries through third-party networks. Learn more about their #TTPs :
Tweet media one
0
38
104
@Mandiant
Mandiant
2 months
We are pleased to share the Cyber Threat Intelligence Program Maturity Assessment. This web-based Intelligence Capability Discovery (ICD) will help commercial and governmental organizations evaluate the maturity (cont)
1
27
105
@Mandiant
Mandiant
3 years
“We need to see more law enforcement disruptions of these #ransomware attacks if we want to change their behavior.” - Christopher Krebs addressing attendees at #CyberDefenseSummit
Tweet media one
1
23
100
@Mandiant
Mandiant
4 months
Check out our initial findings on zero-day exploitation of Ivanti appliances by a suspected APT. 👇 We share details on five malware families related to the exploitation, as well as IOCs, YARA rules, and more for defenders to stay ahead of the threat.
4
38
103
@Mandiant
Mandiant
6 months
Congratulations to the 219 Flare-On Challenge finishers! With 4,767 registered users, this is the most difficult challenge we’ve ever produced. Interested in learning more about the 13 challenges? Check out the solutions from the authors themselves. #Flare
0
38
104
@Mandiant
Mandiant
7 years
Tweet media one
1
92
98
@Mandiant
Mandiant
2 months
In the latest release of capa v7, we have integrated capa with Ghidra, bringing capa’s detection capabilities directly to Ghidra’s user interface. Read our latest blog to integrate your Ghidra workflows: #Flare #ReverseEngineering
0
37
101
@Mandiant
Mandiant
8 months
Announcing the 10th annual Flare-On Challenge, launching on Sept. 29, 2023! The challenge is designed for the world’s best reverse engineers to test their skills through difficult puzzles, featuring a retro-computing challenge involving PDP-11. #flareon10
0
29
101
@Mandiant
Mandiant
2 years
Responding to Western sanctions, Russia is likely to tap actors including Sandworm, UNC2589, UNC3715, and potentially TEMP.Isotope, for response, escalation, and possible destructive actions:
Tweet media one
2
61
99
@Mandiant
Mandiant
2 years
Today we published new research showing how #APT29 , the threat group behind the #SolarWinds attack, is using new tactics and actively targeting Microsoft 365. Read more. ⤵️
2
35
97
@Mandiant
Mandiant
3 years
Today we've completed the sale of the FireEye Products business. We want to take a moment to acknowledge & honor the incredible work our former colleagues delivered for Mandiant & our customers, and to wish them well as they move forward under Bryan Palma’s capable leadership.
0
21
92
@Mandiant
Mandiant
2 years
We've published a blog post on our analysis of the INCONTROLLER framework, covering how new state-sponsored cyber attack tools target multiple industrial control systems. Thanks to @SchneiderElec & our partners for their contribution. Full post 👇 #ICS
0
60
89
@Mandiant
Mandiant
1 year
Run, don't walk. Listen to our latest #ThreatTrends episode feat. Mandiant's Joe Dobson & Michael Barnhart on #DPRK threat groups & a view of the threat landscape in the region. They also chat about the tactics actors are using to target #cryptocurrency .
8
20
83
@Mandiant
Mandiant
2 years
How can your security team benefit from increased external visibility? Hear from our experts on how Mandiant Advantage Attack Surface Management helps automate external asset discovery & reconnaissance efforts. Register today!
Tweet media one
3
3
85
@Mandiant
Mandiant
2 years
Mandiant has published a new report outlining new activities & tactics carried out by a threat actor we are associating w/ the #SolarWinds supply chain attack. Read more in our latest blog post.
0
26
87
@Mandiant
Mandiant
2 years
“We’re celebrating the start. It’s not the finish line," said our CEO, Kevin Mandia, speaking to Mandiant employees in an all company town hall called to discuss the close of Google's acquisition of the firm. Read his blog here 👇
6
27
79
@Mandiant
Mandiant
2 years
🔔 🔔 🔔 The Nasdaq Closing Bell has been rung with the help of Mandiant leadership. Many thanks to @Nasdaq for inviting us to celebrate $MNDT.
Tweet media one
2
7
84
@Mandiant
Mandiant
4 years
This week’s Twitter hack showed that it's possible for foreign threat actors to hijack media accounts & spread disinformation right before the U.S. election. Read more of @JohnHultquist ’s thoughts. via @SangerNYT , @nicoleperlroth , & @NYTnickc at @nytimes
4
55
75
@Mandiant
Mandiant
3 years
Today, we disclosed a critical risk vulnerability in coordination with @CISAgov that affects millions of IoT devices using the ThroughTek “Kalay” network. Read more about it in our new blog post ⤵️
1
42
82
@Mandiant
Mandiant
3 months
Through our extensive experience responding to some of the world's most impactful threats, we found six critical tasks that organizations should implement to effectively mitigate cyber risk. #CyberSnapshot #DefendersAdvantage
Tweet media one
2
24
78
@Mandiant
Mandiant
3 years
We've refocused to be as agile and powerful as possible to defend you against cyber attacks. We are Mandiant.
Tweet media one
2
27
74
@Mandiant
Mandiant
3 years
We've observed DARKSIDE affiliate UNC2465 accessing at least one victim through a Trojanized software installer downloaded from a legitimate website. ▶️
Tweet media one
1
42
76
@Mandiant
Mandiant
2 years
Here is @JumpforJoyce with insights on what the #cybersecurity industry should be prepping for in 2023. Stay tuned for much more from our Mandiant Cyber Security Forecast 2023 report, dropping next Wednesday, November 2.
9
15
74
@Mandiant
Mandiant
2 years
In July 2022, Mandiant Managed Defense identified a novel spear phish methodology employed by a threat cluster tracked as UNC4034. Read our blog to learn more. ⬇️
0
26
75
@Mandiant
Mandiant
4 years
Check out a few suggestions that can help you analyze most types of #data with #MicrosoftExcel , which will allow you to develop an efficient way to analyze important evidence. >> Read more in our blog:
Tweet media one
1
24
75
@Mandiant
Mandiant
1 year
🚨 New research alert! Mandiant has observed a new espionage operation targeting #Ukraine . We suspect this activity is being conducted by the Russian #cyberespionage group, Turla Team. Read the blog to learn more. ⬇️
0
43
76
@Mandiant
Mandiant
1 month
In 2023, we teamed up with @Google ’s Threat Analysis Group (TAG) to track down 97 zero-day vulnerabilities. Our findings: 61 hit end user platforms, 36 targeted enterprise tech. Read the report! #Cybersecurity #ZeroDayVulnerabilities #ThreatAnalysis
Tweet media one
0
21
74
@Mandiant
Mandiant
2 years
We found suspected Russian cyber actors used evacuation & humanitarian documents as #spearphishing lures against Ukrainian entities Read details on those campaigns, including new #malware found, & the suspected threat actors behind it here:
@CNMF_CyberAlert
USCYBERCOM Cybersecurity Alert
2 years
🇺🇦🇺🇸Ukrainian partners are actively sharing malicious activity with us to bolster collective cybersecurity, as we share w/them. Thanks to close collaboration with @servicessu , we are disclosing IOCs associated w/malware recently found in Ukrainian networks
22
241
571
2
45
74
@Mandiant
Mandiant
2 years
Our annual Flare-On Challenge is back! This is a CTF-style challenge for all active and aspiring reverse engineers, malware analysts, and security professionals. Read more about #FlareOn9 , which begins Sept. 30 at 8pm ET. 👇
2
32
74
@Mandiant
Mandiant
3 years
We identified 3 #zeroday vulnerabilities with Managed Defense in SonicWall’s Email Security (ES) product. The vulns were being exploited in the wild to obtain admin access and code execution on a SonicWall ES device. Learn more in our blog post:
Tweet media one
1
48
71
@Mandiant
Mandiant
3 years
While things like our corporate name and $MNDT ticker symbol on @Nasdaq may be new, the cyber security and peace of mind we provide are as strong as ever.
Tweet media one
14
9
68
@Mandiant
Mandiant
1 year
APT43 | North Korea is gaining intelligence on international negotiations, sanctions policy, foreign relations, and domestic politics using this cyber operator. Download the Mandiant APT43 report to learn more:
Tweet media one
0
38
70
@Mandiant
Mandiant
2 years
Trello? Is it #APT29 you’re looking for? Our researchers have discovered two new malware families being used by APT29 in spear phishing campaigns to obtain diplomatic and foreign policy information from governments around the world. More here ⤵️
1
33
71
@Mandiant
Mandiant
2 years
Flare-On is back! 🙌 This year's challenge will feature a total of 11 challenges featuring a variety of formats including Windows, JavaScript, .NET, Python, and even Motorola 68k Macintosh. Read more about #FlareOn9 , which begins Sept. 30 @ 8pm ET.
2
37
72
@Mandiant
Mandiant
1 year
Mandiant identified 55 zero-day vulnerabilities exploited in 2022 which represents a 200% increase compared to 2020.
0
37
67
@Mandiant
Mandiant
2 years
Our FLARE team has released the Ghidrathon extension, which adds Python 3 scripting capabilities to Ghidra that tightly integrates with Ghidra's UI. Read our latest blog post to learn more. ⤵️
0
26
66
@Mandiant
Mandiant
1 month
Dive into our latest blog on APT29's use of WINELOADER to target German political parties. Learn about tactics, impacts, and defense strategies. Read the analysis: #Cybersecurity #ThreatIntel #APT29
0
20
67
@Mandiant
Mandiant
3 years
Get excited! #FLAREOn8 kicks off this Friday 8PM ET/5 PM PT at flare-on[dot]com. This year’s contest will consist of 10 challenges and feature a variety of formats, including Windows, Linux, and JavaScript. Learn more:
2
32
68
@Mandiant
Mandiant
2 years
It’s race day! Team Mandiant is excited to see @AlpineF1Team at the starting line at the #BritishGP .
Tweet media one
1
1
63
@Mandiant
Mandiant
1 year
We're dropping our next #ThreatTrends episode a bit early this week! Tune in to hear from @gabby_roncone , @Big_Bad_W0lf_ & @tylabs on the Russian cyber activity related to #Ukraine Mandiant has been tracking over the last year. 🎧:
2
22
61
@Mandiant
Mandiant
2 years
It was an honor to join @Nasdaq ’s Closing Bell ceremony today as we celebrate our listing as $MNDT. If you missed the event, you still can watch it at
Tweet media one
0
5
63
@Mandiant
Mandiant
14 days
🚨 Explore the rising threat of cyberattacks leveraging System Center Configuration Manager (SCCM) in our newest blog post. Gain expert insights and learn how to protect your organization. Read now: #Cybersecurity #SCCM
Tweet media one
1
21
63
@Mandiant
Mandiant
9 months
We just released an Indicators of Compromise Scanner that is designed to help organizations scan their Citrix appliances for evidence of post-exploitation activity related to CVE-2023-3519. Learn more about this tool and download it today: #ZeroDayThreat
2
32
62
@Mandiant
Mandiant
6 years
THREAD: We want to be clear that Mandiant did not & does not employ "hack back" techniques and have written a blog that goes into more detail: (1/n)
2
55
61
@Mandiant
Mandiant
1 month
In collaboration with @Google 's Threat Analysis Group (TAG), we've released a comprehensive report on #zerodayvulnerabilities observed in 2023, offering insights and recommendations for cybersecurity professionals. Stay ahead of threats: #Cybersecurity
Tweet media one
1
24
63
@Mandiant
Mandiant
8 months
Our latest blog, Deleting Your Way Into SYSTEM: Why Arbitrary File Deletion Vulnerabilities Matter: dives into the realm of local file-based escalation attacks which can allow them to delete files on Windows system. Read the full blog here:
0
14
61
@Mandiant
Mandiant
2 years
Today we are pleased to announce a new strategic alliance with @SentinelOne to help organizations reduce the risk of data breaches and strengthen their ability to mitigate cyber threats. Read more:
Tweet media one
3
14
63
@Mandiant
Mandiant
1 year
Cyber Security Forecast 2023 is out! To help improve overall preparedness, we've tapped leaders & experts across Mandiant for perspective, including our Head of Global intelligence @JumpforJoyce and also @philvenables , CISO @Google Cloud. Read more here ⤵️
0
19
59
@Mandiant
Mandiant
4 years
Mandiant Advantage has entered the chat.
3
24
58
@Mandiant
Mandiant
2 years
Today we published new research on a unique #malware ecosystem that was found deployed on VMware hypervisors & guest systems by an advanced & suspected espionage threat actor. Read our blog to learn more about the threat:
2
28
59
@Mandiant
Mandiant
2 years
It's another great day for a race. Good luck to @AlpineF1Team at the #JapaneseGP !
Tweet media one
0
0
60
@Mandiant
Mandiant
1 year
M-Trends 2023 is live! Download the 14th edition of Mandiant’s unique analysis of today’s cyber threat landscape today. #MTrends #Cybersecurity
Tweet media one
2
38
59