A highly sophisticated threat actor has stolen tools used by cybersecurity company FireEye to evaluate the security posture of enterprise systems, which unauthorized third-party users could abuse to take control of targeted systems, the Cybersecurity and Infrastructure Security Agency announced yesterday.

CISA recommends cybersecurity practitioners review details on the theft of the FireEye Red Team tools and countermeasures available to minimize the threat. 

This is a really big deal — to say the least. It puts every organization in every sector at risk,” said John Riggi, AHA’s senior advisor for cybersecurity and risk. “It’s equivalent to sophisticated foreign criminals or spies breaking into a highly secure armory and stealing the ‘good guys’ most capable and effective weapons. I can’t emphasize enough to all organizations, especially those that possess sensitive data and research, to implement FireEye’s countermeasures as soon as possible.”  

For more on this and other cybersecurity and risk issues, hospital and health system leaders may contact Riggi at jriggi@aha.org.

Related News Articles

Headline
The FBI, Cybersecurity and Infrastructure Security Agency and Australian Cyber Security Centre June 4 released an advisory on updated actions and tactics used…
Headline
The National Security Agency, Cybersecurity and Infrastructure Security Agency and international partners May 22 released guidance on securing data used for…
Headline
The FBI, along with the National Security Agency and other international cybersecurity agencies, this week released a joint agency advisory on cyber operations…
Headline
The FBI's Internet Crime Complaint Center released an alert May 7 warning of cyber actors exploiting vulnerabilities in end-of-life routers. Routers dated 2010…
Headline
The FBI’s Internet Criminal Complaint Center May 15 released an alert warning of a malicious text and voice messaging campaign involving impersonators…
Headline
In his latest AHA Cyber Intel blog, John Riggi, AHA national advisor for cybersecurity and risk, examines the state of cyber and physical threats in 2025 as…