HOME

TheInfoList



OR:

Trellix (formerly FireEye and McAfee Enterprise) is a privately held
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
company that was founded in 2022. It provides hardware, software, and services to investigate cybersecurity attacks, protect against
malicious software Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
, and analyze IT security risks. In March 2021,
Symphony Technology Group STG Partners, LLC (STG) is an American private equity firm and based in Menlo Park, California. Its predecessor, Symphony Technology Group ("Symphony") was founded in 2002Dorbian, Iris (July 1, 2024) STG Rising: Hailing the Newcomer on the 100. ...
(STG) announced its acquisition of McAfee Enterprise in an all-cash transaction for US$4.0 billion. STG completed the acquisition of McAfee's Enterprise business in July 2021 with plans for re-branding. In June 2021, FireEye sold its name and products business to STG for $1.2bn. STG combined FireEye with
McAfee McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American proprietary software company focused on online ...
's enterprise business to launch Trellix, an extended detection and response (XDR) company. Meanwhile, McAfee Enterprise's security service edge (SSE) business would operate as a separate company to be known as Skyhigh Security.


History

FireEye was founded in 2004 by Ashar Aziz, a former
Sun Microsystems Sun Microsystems, Inc., often known as Sun for short, was an American technology company that existed from 1982 to 2010 which developed and sold computers, computer components, software, and information technology services. Sun contributed sig ...
engineer. FireEye's first commercial product was not developed and sold until 2010. Initially, FireEye focused on developing
virtual machine In computing, a virtual machine (VM) is the virtualization or emulator, emulation of a computer system. Virtual machines are based on computer architectures and provide the functionality of a physical computer. Their implementations may involve ...
s to download and test
internet traffic Internet traffic is the flow of data within the entire Internet, or in certain network links of its constituent networks. Common traffic measurements are total volume, in units of multiples of the byte, or as transmission rates in bytes per cert ...
before transferring it to a corporate or government network. In December 2012, founder Aziz stepped down as CEO and former
McAfee McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American proprietary software company focused on online ...
CEO David DeWalt was appointed to the position to prepare the company for an
initial public offering An initial public offering (IPO) or stock launch is a public offering in which shares of a company are sold to institutional investors and usually also to retail (individual) investors. An IPO is typically underwritten by one or more investm ...
(IPO). The following year, FireEye raised an additional $50 million in
venture capital Venture capital (VC) is a form of private equity financing provided by firms or funds to start-up company, startup, early-stage, and emerging companies, that have been deemed to have high growth potential or that have demonstrated high growth in ...
, bringing its total funding to $85M. In late 2013, FireEye went public, raising $300M. FireEye remained public until 2021. In December 2013, FireEye acquired Mandiant for $1bn. Mandiant was a private company founded in 2004 by Kevin Mandia that provided incident response services in the event of a data security breach. Mandiant was known for investigating high-profile hacking groups. Before the acquisition, FireEye would often identify a security breach, then partner with Mandiant to investigate who the hackers were. Mandiant became a subsidiary of FireEye. Since acquiring Mandiant, FireEye has been called in to investigate high-profile attacks against Target, JP Morgan Chase,
Sony Pictures Sony Pictures Entertainment Inc. is an American diversified multinational mass media and entertainment studio conglomerate that produces, acquires, and distributes filmed entertainment (theatrical motion pictures, television programs, and rec ...
,
Anthem An anthem is a musical composition of celebration, usually used as a symbol for a distinct group, particularly the national anthems of countries. Originally, and in music theory and religious contexts, it also refers more particularly to sho ...
, and others. In 2010, FireEye expanded into the Middle East and the Asian Pacific. The company entered Europe in 2011 and Africa in 2013. At the time, FireEye was growing rapidly:revenues multiplied eight-fold between 2010 and 2012. However, FireEye was not yet profitable, due to high operating costs such as
research and development Research and development (R&D or R+D), known in some countries as OKB, experiment and design, is the set of innovative activities undertaken by corporations or governments in developing new services or products. R&D constitutes the first stage ...
expenses. In late 2014, FireEye initiated a secondary offering, selling another $1.1bn in
shares In financial markets, a share (sometimes referred to as stock or equity) is a unit of equity ownership in the capital stock of a corporation. It can refer to units of mutual funds, limited partnerships, and real estate investment trusts. Sha ...
, to fund the development of a wider range of products. Shortly afterward, FireEye acquired high-speed packet capture company, nPulse, for approximately $60M. By 2015, FireEye was making more than $100M in annual revenue, but was still unprofitable, largely due to research and development overspending. In January 2016, FireEye acquired iSIGHT Partners for $275M. iSIGHT was a threat intelligence company that gathered information about hacker groups and other cybersecurity risks. This was followed by the acquisition of Invotas, an IT security automation company. DeWalt stepped down as CEO in 2016 and was replaced by Mandiant CEO and former FireEye President Kevin Mandia. Afterwards, there was downsizing and restructuring in response to lower-than-expected sales, resulting in a layoff of 300–400 employees. Profit and revenue increased on account of shifts to a subscription model and lower costs. In March 2021,
Symphony Technology Group STG Partners, LLC (STG) is an American private equity firm and based in Menlo Park, California. Its predecessor, Symphony Technology Group ("Symphony") was founded in 2002Dorbian, Iris (July 1, 2024) STG Rising: Hailing the Newcomer on the 100. ...
(STG) acquired McAfee Enterprise for $4bn. In June 2021, FireEye announced the sale of its products business and name to STG for $1.2 bn. The sale split off its cyber forensics unit, Mandiant, and the FireEye stock symbol FEYE was relaunched as MNDT on the
NASDAQ The Nasdaq Stock Market (; National Association of Securities Dealers Automated Quotations) is an American stock exchange based in New York City. It is the most active stock trading venue in the U.S. by volume, and ranked second on the list ...
on October 5, 2021. On January 18, 2022, STG announced the launch of Trellix, an extended detection and response company, which is a combination of FireEye and the McAfee enterprise business. On September 30, 2021, STG announced Bryan Palma as CEO of the combined company. In January 2025 Symphony Technology Group tapped Vishal Rao to take over as CEO of Trellix while continuing to serve as chief executive of sister company Skyhigh Security.


Products and services

FireEye started with "sandboxing", in which incoming network traffic is opened within a
virtual machine In computing, a virtual machine (VM) is the virtualization or emulator, emulation of a computer system. Virtual machines are based on computer architectures and provide the functionality of a physical computer. Their implementations may involve ...
to test it for malicious software before being introduced into the network. FireEye's products diversified over time, in part through acquisitions. In 2017, FireEye transitioned from primarily selling appliances, to a
software-as-a-service Software as a service (SaaS ) is a cloud computing service model where the provider offers use of application software to a client and manages all needed physical and software resources. SaaS is usually accessed via a web application. Unlike oth ...
model. FireEye sells technology products including network, email, and endpoint security, a platform for managing security operations centers called Helix, and consulting services primarily based on incident response and threat intelligence products. The Central Management System (CMS) consolidates the management, reporting, and data sharing of Web MPS (Malware Protection System), Email MPS, File MPS, and Malware Analysis System (MAS) into a single network-based appliance by acting as a distribution hub for malware security intelligence. The FireEye Cloud crowd-sources Dynamic Threat Intelligence (DTI) detected by individual FireEye MPS appliances and automatically distributes this time-sensitive zero-day intelligence globally to all subscribed customers in frequent updates. Content Updates include a combination of DTI and FireEye Labs generated intelligence identified through research efforts. As of its inception in January 2022, Trellix has more than 40,000 customers, 5,000 employees, and $2bn in annual revenue. Trellix includes the endpoint, cloud, collaboration, data and user, application, and infrastructure security capabilities of FireEye and McAfee. The business focuses on threat detection and response using machine learning and automation, with security technology that can learn and adapt to combat advanced threats.


Operations

FireEye has been known for uncovering high-profile hacking groups.


2008–2014

In October/November 2009, FireEye participated to take down the Mega-D botnet (also known as Ozdok). On March 16, 2011, the Rustock botnet was taken down through action by
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
, US federal law enforcement agents, FireEye, and the
University of Washington The University of Washington (UW and informally U-Dub or U Dub) is a public research university in Seattle, Washington, United States. Founded in 1861, the University of Washington is one of the oldest universities on the West Coast of the Uni ...
. In July 2012, FireEye was involved in the analysis of the Grum botnet's command and control servers located in the Netherlands, Panama, and Russia. In 2013, Mandiant (before being acquired by FireEye) uncovered a multi-year espionage effort by a Chinese hacking group called APT1. In 2014, the FireEye Labs team identified two new zero-day vulnerabilities – – as part of limited, targeted attacks against major corporations. Both zero-days exploit the Windows kernel. Microsoft addressed the vulnerabilities in the October 2014 Security Bulletin. Also in 2014, FireEye provided information on a threat group it calls FIN4. FIN4 appears to conduct intrusions that are focused on a single objective: obtaining access to insider information capable of making or breaking the stock prices of public companies. The group has targeted hundreds of companies and specifically targets the emails of corporate-level executives, legal counsel, regulatory personnel, and individuals who would regularly discuss market-moving information. Also in 2014, FireEye released a report focused on a threat group it refers to as APT28. APT28 focuses on collecting intelligence that would be most useful to a government. FireEye found that since at least 2007, APT28 has been targeting privileged information related to governments, militaries, and security organizations that would likely benefit the Russian government.


2015

In 2015, FireEye confirmed the existence of at least 14 router implants spread across four different countries: Ukraine, the Philippines, Mexico, and India. Referred to as SYNful Knock, the implant is a stealthy modification of the router's firmware image that can be used to maintain persistence within a victim's network. In September 2015, FireEye obtained an injunction against a security researcher attempting to report vulnerabilities in FireEye Malware Protection System. In 2015, FireEye uncovered an attack exploiting two previously unknown vulnerabilities, one in
Microsoft Office Microsoft Office, MS Office, or simply Office, is an office suite and family of client software, server software, and services developed by Microsoft. The first version of the Office suite, announced by Bill Gates on August 1, 1988, at CO ...
() and another in Windows (). The attackers hid the exploit within a
Microsoft Word Microsoft Word is a word processor program, word processing program developed by Microsoft. It was first released on October 25, 1983, under the name Multi-Tool Word for Xenix systems. Subsequent versions were later written for several other platf ...
document (.docx) that appeared to be a résumé. The combination of these two exploits grants fully privileged remote code execution. Both vulnerabilities were patched by Microsoft. In 2015, the FireEye as a Service team in
Singapore Singapore, officially the Republic of Singapore, is an island country and city-state in Southeast Asia. The country's territory comprises one main island, 63 satellite islands and islets, and one outlying islet. It is about one degree ...
uncovered a phishing campaign exploiting an
Adobe Flash Player Adobe Flash Player (known in Internet Explorer, Firefox, and Google Chrome as Shockwave Flash) is a discontinuedExcept in China, where it continues to be used, as well as Harman for enterprise users. computer program for viewing multimedia ...
zero-day vulnerability (). Adobe released a patch for the vulnerability with an out-of-band security bulletin. FireEye attributed the activity to a
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
-based threat group it tracks as APT3.


2016

In 2016, FireEye announced that it had been tracking a pair of cybercriminals referred to as the "Vendetta Brothers." The company said that the enterprising duo uses various strategies to compromise point-of-sale systems, steal payment card information, and sell it on their underground marketplace "Vendetta World." In mid-2016, FireEye released a report on the impact of the 2015 agreement between former
U.S. President The president of the United States (POTUS) is the head of state and head of government of the United States. The president directs the Federal government of the United States#Executive branch, executive branch of the Federal government of t ...
Barack Obama Barack Hussein Obama II (born August 4, 1961) is an American politician who was the 44th president of the United States from 2009 to 2017. A member of the Democratic Party, he was the first African American president in American history. O ...
and
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
's
paramount leader Paramount leader () is an informal term for the most important Supreme leader, political figure in the China, People's Republic of China (PRC). The paramount leader typically controls the Chinese Communist Party (CCP) and the People's Liberatio ...
Xi Jinping Xi Jinping, pronounced (born 15 June 1953) is a Chinese politician who has been the general secretary of the Chinese Communist Party (CCP) and Chairman of the Central Military Commission (China), chairman of the Central Military Commission ...
that neither government would "conduct or knowingly support cyber-enabled theft of intellectual property" for economic advantage. The security firm reviewed the activity of 72 groups that it suspects are operating in China or otherwise support Chinese state interests and determined that, as of mid-2014, there was an overall decrease in successful network compromises by China-based groups against organizations in the U.S. and 25 other countries. In 2016, FireEye announced that it had identified several versions of an ICS-focused malware – dubbed IRON GATE – crafted to manipulate a specific industrial process running within a simulated Siemens control system environment. Although Siemens Product Computer Emergency Readiness Team (ProductCERT) confirmed to FireEye that IRON GATE is not viable against operational Siemens control systems and that IRON GATE does not exploit any vulnerabilities in Siemens products, the security firm said that IRON GATE invokes ICS attack concepts first seen in
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
. On May 8, 2016, FireEye detected an attack exploiting a previously unknown vulnerability in Adobe Flash Player (). The security firm reported the issue to the Adobe Product Security Incident Response Team (PSIRT) and Adobe released a patch for the vulnerability just four days later. In 2016, FireEye discovered a widespread vulnerability affecting Android devices that permit local privilege escalation to the built-in user "radio", making it so an attacker can potentially perform activities such as viewing the victim's SMS database and phone history. FireEye reached out to
Qualcomm Qualcomm Incorporated () is an American multinational corporation headquartered in San Diego, California, and Delaware General Corporation Law, incorporated in Delaware. It creates semiconductors, software and services related to wireless techn ...
in January 2016 and subsequently worked with the Qualcomm Product Security Team to address the issue. In 2016, FireEye provided details on FIN6, a cybercriminal group that steals payment card data for monetization from targets predominately in the hospitality and retail sectors. The group was observed aggressively targeting and compromising point-of-sale (POS) systems, and making off millions of payment card numbers that were later sold on an underground marketplace.


2017–2019

In 2017, FireEye detected malicious Microsoft Office RTF documents leveraging a previously undisclosed vulnerability, . This vulnerability allows a malicious actor to download and execute a Visual Basic script containing PowerShell commands when a user opens a document containing an embedded exploit. FireEye shared the details of the vulnerability with Microsoft and coordinated public disclosure timed with the release of a patch by Microsoft to address the vulnerability. In 2018, FireEye helped
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
identify 652 fake accounts.


2020–2021

FireEye revealed on Tuesday, December 8, 2020, that its systems were pierced by what it called "a nation with top-tier offensive capabilities". The company said the attackers used "novel techniques" to steal copies of FireEye's
red team A red team is a group that simulates an adversary, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses. Red teams work fo ...
tool kit, which the attackers could potentially use in other attacks. The same day, FireEye published countermeasures against the tools that had been stolen. A week later in December 2020, FireEye reported the SolarWinds supply chain attack to the U.S. National Security Agency (NSA), the federal agency responsible for defending the U.S. from cyberattacks, and said its tools were stolen by the same actors. The NSA is not known to have been aware of the attack before being notified by FireEye. The NSA uses SolarWinds software itself. Within a week of FireEye's breach, cyber-security firm McAfee said the stolen tools had been used in at least 19 countries, including the US, the UK, Ireland, the Netherlands, and Australia. During the continued investigation of the hack of their data and that of federal agencies revealed on December 8, 2020, FireEye reported in early January that the hacks originated from inside the USA, sometimes very close to the facilities affected, which enabled the hackers to evade surveillance by the National Security Agency and the defenses used by the Department of Homeland Security.


2022

A 2022 report by Trellix noted that hacking groups Wicked Panda (linked to China) and Cozy Bear (linked to Russia) were behind 46% of all state-sponsored hacking campaigns in the third quarter of 2021 and that in a third of all state-sponsored cyber attacks, the hackers abused Cobalt Strike security tools to get access to the victim's network. In a January 2022 report on
Fox News The Fox News Channel (FNC), commonly known as Fox News, is an American Multinational corporation, multinational Conservatism in the United States, conservative List of news television channels, news and political commentary Television stati ...
, Trellix CEO Bryan Palma stated that there is an increasing level of cyberwarfare threats from Russia and China. A 2022 Trellix report stated that hackers are using
Microsoft OneDrive Microsoft OneDrive is a file-hosting service operated by Microsoft. First released as SkyDrive in August 2007, it allows registered users to store, share, back-up and synchronize their files. OneDrive also works as the storage backend of the ...
in an espionage campaign against government officials in Western Asia. The malware, named by Trellix as Graphite, employs
Microsoft Graph Microsoft Graph is a Microsoft API developer platform that connects multiple services and devices. Initially released in November 2015 as Office 365 Unified API, the Microsoft Graph builds on Microsoft 365 APIs and allows developers to integra ...
to use OneDrive as a command and control server and execute the malware. The attack is split into multiple stages to remain hidden for as long as possible.


Acquisitions


References


External links

* {{official website, https://www.trellix.com/ Computer security companies specializing in botnets Technology companies of the United States Companies based in Milpitas, California Computer forensics Companies listed on the Nasdaq American companies established in 2004 2013 initial public offerings