Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      South Africa headed to the polls in November

      South Africa headed to the polls in November

      30 April 2026
      Google humbles Big Tech's cloud heavyweights

      Google humbles Big Tech’s cloud heavyweights

      30 April 2026
      Logistics start-up Shiprazor pulls in R44-million seed round

      Logistics start-up Shiprazor pulls in R44-million seed round

      30 April 2026
      Why big IT projects in South Africa keep drifting off course

      Why big IT projects in South Africa keep drifting off course

      30 April 2026
      Memory-chip crisis to deepen further, Samsung warns

      Samsung sees no respite as memory shortage set to worsen

      30 April 2026
    • World
      'It was my idea': Musk claims paternity of OpenAI - Elon Musk

      ‘It was my idea’: Musk claims paternity of OpenAI

      29 April 2026
      Pivotal week for US tech stocks

      Pivotal week for US tech stocks

      28 April 2026
      Worries over OpenAI's growth as Anthropic gains ground - Sam Altman. Shelby Tauber/Reuters

      Worries over OpenAI’s growth as Anthropic gains ground

      28 April 2026
      Taylor Swift trademarks her voice to fight AI fakes

      Taylor Swift trademarks her voice to fight AI fakes

      28 April 2026
      DeepSeek's long-awaited V4 model enters preview

      DeepSeek’s long-awaited V4 model enters preview

      24 April 2026
    • In-depth
      Alfa's electric rebel - Alfa Romeo Junior Elettrica Veloce

      Alfa’s electric rebel

      29 April 2026
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
    • TCS

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
      TCS | Donovan Marsh on AI and the future of filmmaking

      TCS | Donovan Marsh on AI and the future of filmmaking

      7 April 2026
      TCS+ | Vodacom Business moves to crack the SME tech gap - Andrew Fulton, Sannesh Beharie

      TCS+ | Vodacom Business moves to crack the SME tech gap

      7 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
    • Opinion
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Free calls, dead voice and Shameel Joosub’s Spanish ghost

      22 April 2026
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • Contactable
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Why everyone should be worried by the FireEye hack

    Why everyone should be worried by the FireEye hack

    By Agency Staff10 December 2020
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    Image: Blake Cheek

    Unless you’re an IT guru, or someone whose professional duties include protecting computer networks from cyberattacks, you may not have heard of FireEye, a little Californian company specialising in digital warfare.

    But you should pay attention to what happened to FireEye recently, because it speaks volumes about persistent threats to private and public security — and the high-stakes robberies that plague even the most sophisticated operators.

    FireEye’s CEO, Kevin Mandia, disclosed on Tuesday that his company’s servers had been hacked. Given that FireEye is a go-to enterprise for governments and corporations bloodied by their own hacks, and that rely on FireEye to defend or rescue them by identifying and blocking breaches, Mandia’s disclosure is revealing.

    Based on my 25 years in cybersecurity and responding to incidents, I’ve concluded we are witnessing an attack by a nation with top-tier offensive capabilities

    “Based on my 25 years in cybersecurity and responding to incidents, I’ve concluded we are witnessing an attack by a nation with top-tier offensive capabilities. This attack is different from the tens of thousands of incidents we have responded to throughout the years,” Mandia said. “The attackers tailored their world-class capabilities specifically to target and attack FireEye. They are highly trained in operational security and executed with discipline and focus. They operated clandestinely, using methods that counter security tools and forensic examination. They used a novel combination of techniques not witnessed by us or our partners in the past.”

    Who are these guys?

    While the Federal Bureau of Investigation would attribute the FireEye hack only to an “actor” that seemed to be a “nation state”, reporters with the Washington Post were more specific: It was Russia. And not just any Russians, but a group known as “APT29” or “Cozy Bear”, hackers affiliated with the Kremlin’s intelligence services. Cozy Bear’s pedigree includes past hacks of the US state department and White House during the Obama administration and, perhaps most famously, of the Democratic National Committee’s servers during the 2016 presidential campaign. (Who did the dtate department and the White House recruit to clean up the earlier breaches? FireEye.)

    FireEye said the hackers pilfered its so-called “Red Team” tools. That’s the stuff companies like FireEye use to test vulnerabilities of computer networks to make them more resilient. The tools are meant to mimic a complex assault, and now they’re in the hands of a hostile player. FireEye said the hackers focused primarily on information from its government clients, and it released 300 countermeasures for its customers and the public to use against hacks enabled by the stolen tools. The company also said it hadn’t seen any of its tools used yet for break-ins, and none involved “zero-day” exploits — meaning the malware wasn’t used to sneak into and derail a network before defensive patches could be applied.

    “We do not believe that this theft will greatly advance the attacker’s overall capabilities,” FireEye noted.

    FireEye CEO Kevin Mandia

    Maybe. We won’t really know how attackers might use the goodies they ripped off from FireEye until they start trying. The Cybersecurity & Infrastructure Security Agency, a US federal body that monitors digital security, said the thieves could use FireEye’s tools to “take control of targeted systems”. EternalBlue, a hacking tool the US National Security Agency developed to exploit vulnerabilities in Microsoft’s Windows operating system, got out into the wild after the NSA itself was infiltrated in 2017. Hackers successfully used EternalBlue to attack networks for at least a year after the tool was leaked.

    In addition to the federal government, FireEye’s customers have included the city and county of San Francisco, the University of South Carolina, the Penn State Health Milton S Hershey Medical Centre, Sony and Equifax. The company says it has more than 9 600 customers in 103 countries, including more than 50% of the Forbes Global 2000. It also provides digital protection to more than a thousand government and law enforcement agencies worldwide.

    And if FireEye itself can be hacked, who can’t be? Investors aren’t happy with the company. Its share price has plunged more than 13% since it disclosed the attack.

    FireEye isn’t the first security firm to be breached. RSA Security, the company that makes SecurIDs, was hacked back in 2011

    FireEye presumably had lots of complex malware source code on its servers, and either it was lax about leaving sensitive data connected to a network outsiders could access, or its vaunted security protocols weren’t bulletproof. It’s also possible that the hackers weren’t after FireEye’s Red Team tools or even client data. They may have simply wanted to learn how much confidential information FireEye had in its vaults about the world’s most sophisticated digital marauders — folks like Cozy Bear.

    In a world populated with Cozy Bears there are plenty of potential targets.

    On the prowl

    FireEye isn’t the first security firm to be breached. RSA Security, the company that makes SecurIDs, was hacked back in 2011, for example. Duplicates of RSA’s compromised tokens were used to hack Lockheed Martin, a major defence contractor. This year alone, North Korea and Russia have repeatedly tried to hack the servers of pharmaceutical companies pursuing a Covid-19 vaccine. UK and US cybersecurity agencies accused Cozy Bear in July of trying to hack a number of unidentified groups involved in developing a coronavirus vaccine. Pfizer said on Wednesday that coronavirus vaccine documentation it turned over to Europe’s top drug regulator was hacked in a cyberattack on the agency. The NSA recently warned other administrators of national security and defence systems that they were at risk because Russian hackers were exploiting vulnerabilities in products made by VMware, a software company.

    The lesson in all this may be that no person or entity can avoid being hacked if the forces of well-resourced and deft nation states are on the prowl.

    In the most optimistic scenario, all of us may be permanently mired in a never-ending cat-and-mouse game between digital security guards and hackers. The bleaker scenario is endless cyber warfare among countries such as the US, Russia and China — conflicts that have the power to undermine democracy, upend personal privacy, compromise national security, leave societies awash in misinformation and turn that mobile phone you’re holding into a time bomb.  — By Timothy L. O’Brien, (c) 2020 Bloomberg LP

    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    FireEye Kevin Mandia NSA RSA Security top
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSouth Africa’s Renergen patents helium-cooled cases for Covid-19 vaccines
    Next Article Barry Hore to step down as Discovery Bank CEO

    Related Posts

    NSA chief accuses China of ‘very aggressive’ hacking strategy

    31 May 2024
    China accuses US of hacking Huawei servers

    China accuses US of hacking Huawei servers

    20 September 2023

    Likely new NSA boss warns of AI dangers

    21 July 2023
    Company News
    Paratus Mozambique powers 2026 Santa Maria fishing showdown

    Paratus Mozambique powers 2026 Santa Maria fishing showdown

    30 April 2026
    The breach is in the database - Ascent Technology Johan Lamberts

    The breach is in the database

    30 April 2026
    Hospitality sector embraces Google Workspace and Gemini to cut admin - Digicloud Africa, Rand Data Systems

    Hospitality sector embraces Google Workspace and Gemini to cut admin

    30 April 2026
    Opinion
    Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

    Free calls, dead voice and Shameel Joosub’s Spanish ghost

    22 April 2026
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    South Africa headed to the polls in November

    South Africa headed to the polls in November

    30 April 2026
    Paratus Mozambique powers 2026 Santa Maria fishing showdown

    Paratus Mozambique powers 2026 Santa Maria fishing showdown

    30 April 2026
    Google humbles Big Tech's cloud heavyweights

    Google humbles Big Tech’s cloud heavyweights

    30 April 2026
    The breach is in the database - Ascent Technology Johan Lamberts

    The breach is in the database

    30 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}