Mandiant

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

Mandiant
Subsidiary
Industry Information security
Fate Acquired
Founded 2004
Founder Kevin Mandia
Headquarters Alexandria, Virginia
Key people
Kevin Mandia, CEO
Richard Bejtlich, CSO
Revenue Increase US$100 million (2012)
Number of employees
300 (2013)
Parent FireEye, Inc.
Website Mandiant.com

Mandiant is an American cybersecurity firm. It rose to prominence in February 2013 when it released a report directly implicating China in cyber espionage.[1] On December 30, 2013, Mandiant was acquired by FireEye in a stock and cash deal worth in excess of $1 billion.[2]

History[edit]

Kevin Mandia, a former United States Air Force officer who serves as the company's chief executive officer, founded Mandiant as Red Cliff Consulting in 2004 prior to rebranding in 2006.[3] In 2011, Mandiant received funding from Kleiner Perkins Caufield & Byers to expand its staff and grow its business-to-business operations. Mandiant provides incident response and general security consulting along with incident management products to major global organizations, governments, and Fortune 100 companies. Its 2012 revenues were over $100 million, up 76% from 2011.[4] The company was acquired by FireEye on December 30, 2013.[5] Mandiant was awarded both the 2012 and 2013 SC Award for exemplary professional leadership in information-technology (IT) security.[6] Mandiant is the creator of OpenIOC, an extensible XML schema for the description of technical characteristics that identify threats, attackers' methodologies, and evidence of compromise.

APT1 espionage report[edit]

On February 18, 2013, Mandiant released a report[7] documenting evidence of cyber attacks by the People's Liberation Army (specifically Pudong-based PLA Unit 61398[8]) targeting at least 141 organizations in the United States and other English-speaking countries extending as far back as 2006.[9] In the report, Mandiant refers to the espionage unit as APT1.[10] The report states that it is likely that Unit 61398 is the source of the attacks. A video was uploaded to YouTube demonstrating one such intrusion by APT.[11]

References[edit]

  1. ^ "Mandiant Intelligence Center Report". 2013. Retrieved January 5, 2016.
  2. ^ Nicole Perlroth and David E. Sanger (January 2, 2014). "FireEye Computer Security Firm Acquires Mandiant". New York Times. Retrieved January 5, 2016.
  3. ^ "MANDIANT, A New Name for a Fast Growing Company; Red Cliff Consulting LLC Rebrands as Firm Offers Expanded Services, Education and Software Tools". Business Wire. February 14, 2006. Retrieved January 5, 2016.
  4. ^ Brad Stone and Michael Riley (February 7, 2013). "Mandiant, the Go-To Security Firm for Cyber-Espionage Attacks". Bloomberg Business. Retrieved January 5, 2016.
  5. ^ "FireEye Announces Acquisition of Mandiant". 2014. Retrieved January 5, 2016.
  6. ^ "SC Magazine Names Mandiant® the 2013 Professional Award Winner for Best Security Company". March 5, 2013. Archived from the original on June 21, 2013. Retrieved January 5, 2016.
  7. ^ "APT1: Exposing One of China's Cyber Espionage Units" (PDF). February 18, 2013. Retrieved March 15, 2017.
  8. ^ Xu Weiwei (February 20, 2013). "China denies hacking claims". Morning Whistle. Archived from the original on June 29, 2013. Retrieved January 5, 2016.
  9. ^ David E. Sanger, David Barboza and Nicole Perlroth (February 18, 2013). "Chinese Army Unit Is Seen as Tied to Hacking Against U.S." New York Times. Retrieved January 5, 2016.
  10. ^ William Wan and Ellen Nakashima (February 19, 2013). "Report ties cyberattacks on U.S. computers to Chinese military". Washington Post. Retrieved January 5, 2016.
  11. ^ APT1: Exposing One of China's Cyber Espionage Units on YouTube

External links[edit]