Mandiant

Mandiant
Subsidiary
Industry Information security
Fate Acquired
Founded 2004
Founder Kevin Mandia
Headquarters Alexandria, Virginia
Key people
Kevin Mandia, CEO
Richard Bejtlich, CSO
Revenue Increase US$100 million (2012)
Number of employees
300 (2013)
Parent FireEye, Inc.
Website mandiant.com

Mandiant is an American cybersecurity firm. It rose to prominence in February 2013 when it released a report directly implicating China in cyber espionage.[1] On 30 December 2013, Mandiant was acquired by FireEye in a stock and cash deal worth in excess of $1 billion.[2]

History

Kevin Mandia, a former United States Air Force officer who serves as the company's chief executive officer, founded Mandiant as Red Cliff Consulting in 2004 prior to rebranding in 2006.[3] In 2011, Mandiant received funding from Kleiner Perkins Caufield & Byers to expand its staff and grow its business-to-business operations. Mandiant provides incident response and general security consulting along with incident management products to major global organizations, governments, and Fortune 100 companies. Its 2012 revenues were over $100 million, up 76% from 2011.[4] The company was acquired by FireEye on December 30, 2013.[5] Mandiant was awarded both the 2012 and 2013 SC Award for exemplary professional leadership in information-technology (IT) security.[6] Mandiant is the creator of OpenIOC, an extensible XML schema for the description of technical characteristics that identify threats, attackers' methodologies, and evidence of compromise.

APT1 espionage report

On 18 February 2013, Mandiant released a report[7] documenting evidence of cyber attacks by the People's Liberation Army (specifically Pudong District, Shanghai-based PLA Unit 61398[8]) targeting at least 141 organizations in the United States and other English-speaking countries extending as far back as 2006.[9] In the report, Mandiant refers to the espionage unit as APT1.[10] The report states that it is likely that Unit 61398 is the source of the attacks. A video was uploaded to YouTube demonstrating one such intrusion by APT.[11]

References

  1. "Mandiant Intelligence Center Report". 2013. Retrieved 2016-01-05.
  2. Nicole Perlroth and David E. Sanger (2014-01-02). "FireEye Computer Security Firm Acquires Mandiant". New York Times. Retrieved 2016-01-05.
  3. "MANDIANT, A New Name for a Fast Growing Company; Red Cliff Consulting LLC Rebrands as Firm Offers Expanded Services, Education and Software Tools". Business Wire. 2006-02-14. Retrieved 2016-01-05.
  4. Brad Stone and Michael Riley (2013-02-07). "Mandiant, the Go-To Security Firm for Cyber-Espionage Attacks". Bloomberg Business. Retrieved 2016-01-05.
  5. "FireEye Announces Acquisition of Mandiant". 2014. Retrieved 2016-01-05.
  6. "SC Magazine Names Mandiant® the 2013 Professional Award Winner for Best Security Company". 2013-03-05. Archived from the original on 2013-06-21. Retrieved 2016-01-05.
  7. "APT1: Exposing One of China's Cyber Espionage Units" (PDF). 2013-02-18. Retrieved 2016-01-05.
  8. Xu Weiwei (2013-02-20). "China denies hacking claims". Morning Whistle. Retrieved 2016-01-05.
  9. David E. Sanger, David Barboza and Nicole Perlroth (2013-02-18). "Chinese Army Unit Is Seen as Tied to Hacking Against U.S.". New York Times. Retrieved 2016-01-05.
  10. William Wan and Ellen Nakashima (2013-02-19). "Report ties cyberattacks on U.S. computers to Chinese military". Washington Post. Retrieved 2016-01-05.
  11. APT1: Exposing One of China's Cyber Espionage Units on YouTube
This article is issued from Wikipedia - version of the 8/16/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.