Reports are out that the FireEye hacker who allegedly started the #LeakTheAnalyst campaign was arrested last week, October 26th.
It was in July this year when reports of the #LeakTheAnalyst hacking incident set the Internet abuzz. Back then, one of the senior threat intelligence analysts of the FireEye-owned security firm Mandiant, Adi Peretz, had both his personal and professional information leaked by a certain FireEye hacker.
The notorious hacker, who introduced himself then as 31337 Hackers, posted cryptic messages on Pastebin alongside the download links to the alleged stolen files. The hacker claimed he enjoyed watching Mandiant tried to protect its clients and insulted the company’s analysts, calling them dumb for trying to reverse engineer malware.
“Now that ‘Mandiant’ knows how deep we breached into its infrastructure its so-called threat analysts are trying to block us. Let’s see how successful they are going to be :D,” a part of the post read.
Now, over three months after the said hacking incident, FireEye CEO Kevin Mandia informed the media at the company’s Q3 Earnings Results Conference Call on Wednesday that a suspect has been taken into custody by international law enforcement.#FireEye #Mandiant hacker who started the #LeakTheAnalyst campaign arrested!Click To Tweet
FireEye Hacker Arrested Just Three Months After the Hacking Incident
In a statement to the media, Mandia was quoted as saying:
“For the past 90 days, we have worked closely with law enforcement, both domestically and internationally, to assist in the investigation and identification of the anonymous person who is responsible for the attack on one of our employees and who falsely claimed to have breached our corporate networks.”
“As a result of our joint investigation, on Thursday, October 26, an individual was arrested by international law enforcement and taken into custody.”
It should be remembered that the FireEye hacker also claimed that he has complete access to the company’s internal networks since 2016.
In defense, FireEye announced in August that they found no evidence that their corporate network has been breached or compromised. The security firm also clarified that the attacker was only able to compromise social media accounts of just one of its employees.
“Over my career, I’ve found it frustrating how little risk or repercussions exist for the attackers who hide behind the anonymity of the Internet and cause real harm to good, well-intentioned people. These attackers rarely, if ever, get caught. Therefore, I’m pleased that, in this case, we were able to impose repercussions for the attacker and achieve a small victory for the good guys,” Mandia said referring to the arrest.
The FireEye hacker was able to release three corporate documents identifying at least two customer names obtained from Peretz’s personal accounts.
Mandia told CRN that their investigation into the hacking incident had taken a tremendous amount of time and effort which cost the company so much. He went on to say:
“I don’t want to underestimate the unfairness of the situation of an anonymous person making false claims. You have to prove the negative, which is really annoying.”
The identity of the so-called FireEye hacker and other details of the arrest were not divulged by the company nor the authorities, yet.