Click here to download all references as Bib-File.•
2017-10-04
⋅
CrowdStrike
⋅
Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor CCleaner Backdoor |
2017-07-03
⋅
CrowdStrike
⋅
NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery EternalPetya |
2017-06-28
⋅
CrowdStrike
⋅
CrowdStrike Protects Against NotPetya Attack EternalPetya |
2017-04-13
⋅
CrowdStrike
⋅
Inside the Takedown of ZOMBIE SPIDER and the Kelihos Botnet Kelihos ZOMBIE SPIDER |
2016-10-01
⋅
CrowdStrike
⋅
2015 Global Threat Report MIMIC SPIDER |
2016-08-13
⋅
CrowdStrike
⋅
Detecting and Responding: Pandas and Bears FOXY PANDA POISONUS PANDA |
2016-08-01
⋅
CrowdStrike
⋅
CrowdStrike’s New Methodology for Tracking eCrime Corebot BOSON SPIDER |
2016-06-15
⋅
CrowdStrike
⋅
Bears in the Midst: Intrusion into the Democratic National Committee X-Agent ATI-Agent SEADADDY Seduploader X-Agent XTunnel APT28 |
2016-01-01
⋅
CrowdStrike
⋅
Detecting and Responding: Pandas and Bears ELOQUENT PANDA UNION PANDA |
2016-01-01
⋅
CrowdStrike
⋅
Intelligence Report: Emergence and Development of Core Bot Corebot BOSON SPIDER |
2015-12-30
⋅
CrowdStrike
⋅
Bringing A Cannon To A Knife Fight |
2015-08-06
⋅
CrowdStrike
⋅
Bringing A Cannon To A Knife Fight |
2015-06-01
⋅
CrowdStrike
⋅
Rhetoric Foreshadows Cyber Activity in the South China Sea APT23 |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2015-02-23
⋅
CrowdStrike
⋅
Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning |
2015-02-10
⋅
CrowdStrike
⋅
Global Threat Intel Report MAGNETIC SPIDER PALE PANDA PREDATOR PANDA SABRE PANDA SPICY PANDA WET PANDA |
2015-02-06
⋅
CrowdStrike
⋅
CrowdStrike Global Threat Intel Report 2014 BlackPOS CryptoLocker Derusbi Elise Enfal EvilGrab Gameover P2P HttpBrowser Medusa Mirage Naikon NetTraveler pirpi PlugX Poison Ivy Sakula RAT Sinowal sykipot taidoor |
2015-01-26
⋅
CrowdStrike
⋅
Storm Chasing: Hunting Hurricane Panda HURRICANE PANDA |
2014-11-24
⋅
CrowdStrike
⋅
I am Ironman: DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors APT19 |