At approximately 7:29 AM PDT today, we were notified by several
    security researchers that a fireeye[.]com/careers HR link was
    inadvertently serving up a drive-by download exploit. Our internal
    security, IT operations team, and third-party partners quickly
    researched and discovered that the malicious code was not hosted
    directly on any FireEye web infrastructure, but rather, it was
    hosted on a third-party advertiser (aka "malvertisement") that was
    linked via one of our third-party web services. The team then
    responded and immediately removed links to the malicious code in
    conjunction with our partners in order to protect our website users.
    More information on this third-party compromise (of video.js) can be
    found here.

  via [1]Darkleech Says Hello | FireEye Blog.
    __________________________________________________________________

  My original entry is here: [2]Darkleech Says Hello | FireEye Blog. It
  posted Mon, 16 Sep 2013 16:20:25 +0000.
  Filed under: InfoSec, malware,

References

  1. http://www.fireeye.com/blog/technical/cyber-exploits/2013/09/darkleech-says-hello.html
  2. https://www.prjorgensen.com/2013/09/16/darkleech-says-hello-fireeye-blog/