Mandiant

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Mandiant
Subsidiary
Industry Information security
Fate Acquired
Founded 2004
Founder Kevin Mandia
Headquarters Alexandria, Virginia
Key people
Kevin Mandia, CEO
Richard Bejtlich, CSO
Revenue Increase US$100 million (2012)
Number of employees
300 (2013)
Parent FireEye, Inc.
Website mandiant.com

Mandiant is an American cybersecurity firm. It rose to prominence in February 2013 when it released a report directly implicating China in cyber espionage.[1] On 30 December 2013, Mandiant was acquired by FireEye in a stock and cash deal worth in excess of $1 billion.[2]

History[edit]

Kevin Mandia, a former United States Air Force officer who serves as the company's chief executive officer, founded Mandiant as Red Cliff Consulting in 2004 prior to rebranding in 2006.[3] In 2011, Mandiant received funding from Kleiner Perkins Caufield & Byers to expand its staff and grow its business-to-business operations. Mandiant provides incident response and general security consulting along with incident management products to major global organizations, governments, and Fortune 100 companies. Its 2012 revenues were over $100 million, up 76% from 2011.[4] The company was acquired by FireEye on December 30, 2013.[5] Mandiant was awarded both the 2012 and 2013 SC Award for exemplary professional leadership in information-technology (IT) security.[6] Mandiant is the creator of OpenIOC, an extensible XML schema for the description of technical characteristics that identify threats, attackers' methodologies, and evidence of compromise.

APT1 espionage report[edit]

On 18 February 2013, Mandiant released a report[7] documenting evidence of cyber attacks by the People's Liberation Army (specifically Pudong District, Shanghai-based PLA Unit 61398[8]) targeting at least 141 organizations in the United States and other English-speaking countries extending as far back as 2006.[9] In the report, Mandiant refers to the espionage unit as APT1.[10] The report states that it is likely that Unit 61398 is the source of the attacks. A video was uploaded to YouTube demonstrating one such intrusion by APT.[11]

References[edit]

  1. ^ "Mandiant Intelligence Center Report". 2013. Retrieved 2016-01-05. 
  2. ^ Nicole Perlroth and David E. Sanger (2014-01-02). "FireEye Computer Security Firm Acquires Mandiant". New York Times. Retrieved 2016-01-05. 
  3. ^ "MANDIANT, A New Name for a Fast Growing Company; Red Cliff Consulting LLC Rebrands as Firm Offers Expanded Services, Education and Software Tools". Business Wire. 2006-02-14. Retrieved 2016-01-05. 
  4. ^ Brad Stone and Michael Riley (2013-02-07). "Mandiant, the Go-To Security Firm for Cyber-Espionage Attacks". Bloomberg Business. Retrieved 2016-01-05. 
  5. ^ "FireEye Announces Acquisition of Mandiant". 2014. Retrieved 2016-01-05. 
  6. ^ "SC Magazine Names Mandiant® the 2013 Professional Award Winner for Best Security Company". 2013-03-05. Archived from the original on 21 June 2013. Retrieved 2016-01-05. 
  7. ^ "APT1: Exposing One of China’s Cyber Espionage Units" (PDF). 2013-02-18. Retrieved 2017-03-15. 
  8. ^ Xu Weiwei (2013-02-20). "China denies hacking claims". Morning Whistle. Retrieved 2016-01-05. 
  9. ^ David E. Sanger, David Barboza and Nicole Perlroth (2013-02-18). "Chinese Army Unit Is Seen as Tied to Hacking Against U.S.". New York Times. Retrieved 2016-01-05. 
  10. ^ William Wan and Ellen Nakashima (2013-02-19). "Report ties cyberattacks on U.S. computers to Chinese military". Washington Post. Retrieved 2016-01-05. 
  11. ^ APT1: Exposing One of China's Cyber Espionage Units on YouTube

External links[edit]