Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-10-04CrowdStrikeKaran Sood
Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor
CCleaner Backdoor
2017-07-03CrowdStrikeKaran Sood, Shaun Hurley
NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery
EternalPetya
2017-06-28CrowdStrikeFalcon Intelligence Team
CrowdStrike Protects Against NotPetya Attack
EternalPetya
2017-04-13CrowdStrikeFalcon Intelligence Team
Inside the Takedown of ZOMBIE SPIDER and the Kelihos Botnet
Kelihos ZOMBIE SPIDER
2016-10-01CrowdStrikeCrowdStrike
2015 Global Threat Report
MIMIC SPIDER
2016-08-13CrowdStrikeChris Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
FOXY PANDA POISONUS PANDA
2016-08-01CrowdStrikeAdam Meyers
CrowdStrike’s New Methodology for Tracking eCrime
Corebot BOSON SPIDER
2016-06-15CrowdStrikeDmitri Alperovitch
Bears in the Midst: Intrusion into the Democratic National Committee
X-Agent ATI-Agent SEADADDY Seduploader X-Agent XTunnel APT28
2016-01-01CrowdStrikeChristopher Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
ELOQUENT PANDA UNION PANDA
2016-01-01CrowdStrikeCrowdStrike
Intelligence Report: Emergence and Development of Core Bot
Corebot BOSON SPIDER
2015-12-30CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-08-06CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-06-01CrowdStrikeAdam Kozy
Rhetoric Foreshadows Cyber Activity in the South China Sea
APT23
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-02-23CrowdStrikeAdam Kozy
Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning
2015-02-10CrowdStrikeCrowdStrike
Global Threat Intel Report
MAGNETIC SPIDER PALE PANDA PREDATOR PANDA SABRE PANDA SPICY PANDA WET PANDA
2015-02-06CrowdStrikeCrowdStrike
CrowdStrike Global Threat Intel Report 2014
BlackPOS CryptoLocker Derusbi Elise Enfal EvilGrab Gameover P2P HttpBrowser Medusa Mirage Naikon NetTraveler pirpi PlugX Poison Ivy Sakula RAT Sinowal sykipot taidoor
2015-01-26CrowdStrikeAndy Schworer, Josh Liburdi
Storm Chasing: Hunting Hurricane Panda
HURRICANE PANDA
2014-11-24CrowdStrikeMatt Dahl
I am Ironman: DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors
APT19