At approximately 7:29 AM PDT today, we were notified by several
security researchers that a fireeye[.]com/careers HR link was
inadvertently serving up a drive-by download exploit. Our internal
security, IT operations team, and third-party partners quickly
researched and discovered that the malicious code was not hosted
directly on any FireEye web infrastructure, but rather, it was
hosted on a third-party advertiser (aka "malvertisement") that was
linked via one of our third-party web services. The team then
responded and immediately removed links to the malicious code in
conjunction with our partners in order to protect our website users.
More information on this third-party compromise (of video.js) can be
found here.
via [1]Darkleech Says Hello | FireEye Blog.
__________________________________________________________________
My original entry is here: [2]Darkleech Says Hello | FireEye Blog. It
posted Mon, 16 Sep 2013 16:20:25 +0000.
Filed under: InfoSec, malware,
References
1.
http://www.fireeye.com/blog/technical/cyber-exploits/2013/09/darkleech-says-hello.html
2.
https://www.prjorgensen.com/2013/09/16/darkleech-says-hello-fireeye-blog/