Mandiant

Mandiant is an American cybersecurity firm. It rose to prominence in February 2013 when it released a report directly implicating China in cyber espionage.[1] On December 30, 2013, Mandiant was acquired by FireEye in a stock and cash deal worth in excess of $1 billion.[2]

Mandiant
TypeSubsidiary
IndustryInformation security
FateAcquired
Founded2004
FounderKevin Mandia
HeadquartersAlexandria, Virginia
Key people
Kevin Mandia, CEO
Richard Bejtlich, CSO
Revenue US$100 million (2012)
Number of employees
300 (2013)
ParentFireEye, Inc.
WebsiteMandiant.com

History

Kevin Mandia, a former United States Air Force officer who serves as the company's chief executive officer, founded Mandiant as Red Cliff Consulting in 2004 prior to rebranding in 2006.[3] In 2011, Mandiant received funding from Kleiner Perkins Caufield & Byers to expand its staff and grow its business-to-business operations. Mandiant provides incident response and general security consulting along with incident management products to major global organizations, governments, and Fortune 100 companies. Its 2012 revenues were over $100 million, up 76% from 2011.[4] The company was acquired by FireEye on December 30, 2013.[5] Mandiant was awarded both the 2012 and 2013 SC Award for exemplary professional leadership in information-technology (IT) security.[6] Mandiant is the creator of OpenIOC (Open Indicators of Compromise), an extensible XML schema for the description of technical characteristics that identify threats, attackers' methodologies, and evidence of compromise.

Mandiant Advantage

Mandiant Advantage is a subscription-based SaaS platform designed to augment and automate security response teams. The platform combines the threat intelligence gathered by Mandiant and data from cyber incident response engagements.[7]

APT1 espionage report

On February 18, 2013, Mandiant released a report[8] documenting evidence of cyber attacks by the People's Liberation Army (specifically Pudong-based PLA Unit 61398[9]) targeting at least 141 organizations in the United States and other English-speaking countries extending as far back as 2006.[10] In the report, Mandiant refers to the espionage unit as APT1.[11] The report states that it is likely that Unit 61398 is the source of the attacks. A video was uploaded to YouTube demonstrating one such intrusion by APT.[12]

References

  1. "Mandiant Intelligence Center Report". 2013. Retrieved January 5, 2016.
  2. Nicole Perlroth and David E. Sanger (January 2, 2014). "FireEye Computer Security Firm Acquires Mandiant". New York Times. Retrieved January 5, 2016.
  3. "MANDIANT, A New Name for a Fast Growing Company; Red Cliff Consulting LLC Rebrands as Firm Offers Expanded Services, Education and Software Tools". Business Wire. February 14, 2006. Retrieved January 5, 2016.
  4. Brad Stone and Michael Riley (February 7, 2013). "Mandiant, the Go-To Security Firm for Cyber-Espionage Attacks". Bloomberg Business. Retrieved January 5, 2016.
  5. "FireEye Announces Acquisition of Mandiant". 2014. Retrieved January 5, 2016.
  6. "SC Magazine Names Mandiant® the 2013 Professional Award Winner for Best Security Company". March 5, 2013. Archived from the original on June 21, 2013. Retrieved January 5, 2016.
  7. Osborne, Charlie. "FireEye's Mandiant debuts new SaaS threat intelligence suite". ZDNet. Retrieved October 7, 2020.
  8. "APT1: Exposing One of China's Cyber Espionage Units" (PDF). February 18, 2013. Retrieved March 15, 2017.
  9. Xu Weiwei (February 20, 2013). "China denies hacking claims". Morning Whistle. Archived from the original on June 29, 2013. Retrieved January 5, 2016.
  10. David E. Sanger, David Barboza and Nicole Perlroth (February 18, 2013). "Chinese Army Unit Is Seen as Tied to Hacking Against U.S." New York Times. Retrieved January 5, 2016.
  11. William Wan and Ellen Nakashima (February 19, 2013). "Report ties cyberattacks on U.S. computers to Chinese military". Washington Post. Retrieved January 5, 2016.
  12. APT1: Exposing One of China's Cyber Espionage Units on YouTube


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.