Mandiant

From Wikipedia, the free encyclopedia
  (Redirected from APT1)
Jump to: navigation, search
Mandiant
Subsidiary
Industry Information security
Fate Acquired
Founded 2004
Founder Kevin Mandia
Headquarters Alexandria, Virginia
Key people
Kevin Mandia, CEO
Richard Bejtlich, CSO
Revenue Increase US$100 million (2012)
Number of employees
300 (2013)
Parent FireEye, Inc.
Website mandiant.com

Mandiant is an American cybersecurity firm. It rose to prominence in February 2013 when it released a report directly implicating China in cyber espionage.[1] On 30 December 2013, Mandiant was acquired by FireEye in a stock and cash deal worth in excess of $1 billion.[2]

History[edit]

Kevin Mandia, a former United States Air Force officer who serves as the company's chief executive officer, founded Mandiant as Red Cliff Consulting in 2004 prior to rebranding in 2006.[3] In 2011, Mandiant received funding from Kleiner Perkins Caufield & Byers to expand its staff and grow its business-to-business operations. Mandiant provides incident response and general security consulting along with incident management products to major global organizations, governments, and Fortune 100 companies. Its 2012 revenues were over $100 million, up 76% from 2011.[4] The company was acquired by FireEye on December 30, 2013.[5]

APT1 espionage report[edit]

On 18 February 2013, Mandiant released a report[6] documenting evidence of cyber attacks by the People's Liberation Army (specifically Pudong District, Shanghai-based PLA Unit 61398[7]) targeting at least 141 organizations in the United States and other English-speaking countries extending as far back as 2006.[8] In the report, Mandiant refers to the espionage unit as APT1.[9] The report states that it is likely that Unit 61398 is the source of the attacks.

A video was uploaded to YouTube demonstrating one such intrusion by APT.[10]

SC Magazine Awards[edit]

Mandiant was awarded both the 2012 and 2013 SC Award[11] for exemplary professional leadership in information-technology (IT) security. The annual awards showcase the best solutions, services and professionals while recognizing achievement and technical excellence. SC Magazine distinguishes the achievements of the security professionals in the field, the innovations happening in the vendor and service provider communities and the fervent work of government, commercial and nonprofits.

OpenIOC[edit]

Mandiant is the creator of OpenIOC, an extensible XML schema for the description of technical characteristics that identify threats, attackers' methodologies, and evidence of compromise.

References[edit]

  1. ^ "Mandiant Intelligence Center Report". 2013. Retrieved 2016-01-05. 
  2. ^ Nicole Perlroth and David E. Sanger (2014-01-02). "FireEye Computer Security Firm Acquires Mandiant". New York Times. Retrieved 2016-01-05. 
  3. ^ "MANDIANT, A New Name for a Fast Growing Company; Red Cliff Consulting LLC Rebrands as Firm Offers Expanded Services, Education and Software Tools". Business Wire. 2006-02-14. Retrieved 2016-01-05. 
  4. ^ Brad Stone and Michael Riley (2013-02-07). "Mandiant, the Go-To Security Firm for Cyber-Espionage Attacks". Bloomberg Business. Retrieved 2016-01-05. 
  5. ^ "FireEye Announces Acquisition of Mandiant". 2014. Retrieved 2016-01-05. 
  6. ^ "APT1: Exposing One of China’s Cyber Espionage Units" (PDF). 2013-02-18. Retrieved 2016-01-05. 
  7. ^ Xu Weiwei (2013-02-20). "China denies hacking claims". Morning Whistle. Retrieved 2016-01-05. 
  8. ^ David E. Sanger, David Barboza and Nicole Perlroth (2013-02-18). "Chinese Army Unit Is Seen as Tied to Hacking Against U.S.". New York Times. Retrieved 2016-01-05. 
  9. ^ William Wan and Ellen Nakashima (2013-02-19). "Report ties cyberattacks on U.S. computers to Chinese military". Washington Post. Retrieved 2016-01-05. 
  10. ^ APT1: Exposing One of China's Cyber Espionage Units on YouTube
  11. ^ "SC Magazine Names Mandiant® the 2013 Professional Award Winner for Best Security Company". 2013-03-05. Archived from the original on 2013-06-21. Retrieved 2016-01-05. 

See also[edit]

External links[edit]