G-202012-1.7z
: YARA and Snort signatures designed to identify the execution of the stolen tools [3].
: Frameworks and scripts targeting known vulnerabilities (such as those in Pulse Secure, Citrix, and Microsoft Exchange) that the red team used during authorized engagements [2]. G-202012-1.7z
: The archive contains a suite of red teaming tools developed by FireEye to simulate sophisticated cyberattacks [2]. : YARA and Snort signatures designed to identify
: Following a breach by a state-sponsored actor (widely attributed to APT29 or Cozy Bear), FireEye released technical details and a repository of "countermeasures"—including Snort, YARA, and ClamAV rules—to detect these tools in the wild [3]. : Following a breach by a state-sponsored actor
While the specific contents of a file with this exact naming convention can vary depending on the repository source (e.g., GitHub mirrors or malware analysis sites), it typically includes:
