Mandiant

From Wikipedia, the free encyclopedia

Mandiant, Inc.
FormerlyFireEye, Inc.
TypePublic company
IndustryInformation security
Founded2004; 18 years ago (2004)
FounderKevin Mandia
HeadquartersReston, Virginia, U.S.
Key people
Kevin Mandia, CEO
RevenueIncrease US$400 million (2021)
Number of employees
1000-2000 (2021)
Websitemandiant.com

Mandiant is a publicly traded[1] American cybersecurity firm. It rose to prominence in February 2013 when it released a report directly implicating China in cyber espionage.[2] On December 30, 2013, Mandiant was acquired by FireEye in a stock and cash deal worth in excess of $1 billion.[3] In June 2021, after 7 years of stagnant growth under parent company FireEye, Mandiant sold the FireEye product line, name, and roughly 1300 employees to Symphony Technology Group for $1.2 billion. The remaining organization will focus on Mandiant Advantage and services.[4]

History[]

Kevin Mandia, a former United States Air Force officer who serves as the company's chief executive officer, founded Mandiant as Red Cliff Consulting in 2004 prior to rebranding in 2006.[5] In 2011, Mandiant received funding from Kleiner Perkins Caufield & Byers to expand its staff and grow its business-to-business operations. Mandiant provides incident response and general security consulting along with incident management products to major global organizations, governments, and Fortune 100 companies. Its 2012 revenues were over $100 million, up 76% from 2011.[6] The company was acquired by FireEye on December 30, 2013.[7] Mandiant was awarded both the 2012 and 2013 SC Award for exemplary professional leadership in information-technology (IT) security.[8] Mandiant is the creator of OpenIOC (Open Indicators of Compromise), an extensible XML schema for the description of technical characteristics that identify threats, attackers' methodologies, and evidence of compromise.

Acquisitions[]

Announcement date Company Business Deal size References
Before June 2021 List of FireEye acquisitions
August 2021 Intrigue attack surface management [9]

Mandiant Advantage[]

Mandiant Advantage is a subscription-based SaaS platform designed to augment and automate security response teams. The platform combines the threat intelligence gathered by Mandiant and data from cyber incident response engagements.[10]

APT1 espionage report[]

On February 18, 2013, Mandiant released a report[11] documenting evidence of cyber attacks by the People's Liberation Army (specifically Pudong-based PLA Unit 61398[12]) targeting at least 141 organizations in the United States and other English-speaking countries extending as far back as 2006.[13] In the report, Mandiant refers to the espionage unit as APT1.[14] The report states that it is likely that Unit 61398 is the source of the attacks. A video was uploaded to YouTube demonstrating one such intrusion by APT.[15]

SolarWinds Supply Chain Attack[]

In December 2020, Mandiant revealed and investigated the largest supply chain attack on US government infrastructure ever recorded.[16]

Colonial Pipeline Ransomware[]

In May 2021, Mandiant assisted the government in the largest Industrial control system hack on US soil against Colonial Pipeline, a fuel pipeline operator that supplies close to half of the gasoline, diesel, and other fuels to the East Coast.[17][18]

References[]

  1. ^ FireEye's press release that FEYE will be relaunched as MNDT (Mandiant) on 5th October, 2021 in NASDAQ
  2. ^ "Mandiant Intelligence Center Report". 2013. Retrieved January 5, 2016.
  3. ^ Nicole Perlroth and David E. Sanger (January 2, 2014). "FireEye Computer Security Firm Acquires Mandiant". New York Times. Retrieved January 5, 2016.
  4. ^ "About the Sale of Products Business to STG". 2021. Retrieved June 5, 2021.
  5. ^ "MANDIANT, A New Name for a Fast Growing Company; Red Cliff Consulting LLC Rebrands as Firm Offers Expanded Services, Education and Software Tools". Business Wire. February 14, 2006. Retrieved January 5, 2016.
  6. ^ Brad Stone and Michael Riley (February 7, 2013). "Mandiant, the Go-To Security Firm for Cyber-Espionage Attacks". Bloomberg Business. Retrieved January 5, 2016.
  7. ^ "FireEye Announces Acquisition of Mandiant". 2014. Retrieved January 5, 2016.
  8. ^ "SC Magazine Names Mandiant® the 2013 Professional Award Winner for Best Security Company". March 5, 2013. Archived from the original on June 21, 2013. Retrieved January 5, 2016.
  9. ^ "Mandiant Adds Attack Surface Management to its SaaS Portfolio with the Acquisition of Intrigue". FireEye.
  10. ^ Osborne, Charlie. "FireEye's Mandiant debuts new SaaS threat intelligence suite". ZDNet. Retrieved October 7, 2020.
  11. ^ "APT1: Exposing One of China's Cyber Espionage Units" (PDF). February 18, 2013. Retrieved March 15, 2017.
  12. ^ Xu Weiwei (February 20, 2013). "China denies hacking claims". Morning Whistle. Archived from the original on June 29, 2013. Retrieved January 5, 2016.
  13. ^ David E. Sanger, David Barboza and Nicole Perlroth (February 18, 2013). "Chinese Army Unit Is Seen as Tied to Hacking Against U.S." New York Times. Retrieved January 5, 2016.
  14. ^ William Wan and Ellen Nakashima (February 19, 2013). "Report ties cyberattacks on U.S. computers to Chinese military". Washington Post. Retrieved January 5, 2016.
  15. ^ APT1: Exposing One of China's Cyber Espionage Units on YouTube
  16. ^ "Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor". 2020. Retrieved June 5, 2021.
  17. ^ "Hackers Breached Colonial Pipeline Using Compromised Password". June 4, 2021. Retrieved June 5, 2021.
  18. ^ "Ransomware attack leads to shutdown of major U.S. pipeline system". Washington Post. ISSN 0190-8286. Retrieved December 5, 2021.

External links[]

Retrieved from ""