Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-08-01CrowdStrikePaul Moon
Arrests Put New Focus on CARBON SPIDER Adversary Group
FIN7
2018-07-26CrowdStrikeAdam Meyers
Meet CrowdStrike’s Adversary of the Month for July: WICKED SPIDER
APT41
2018-06-15CrowdStrikeAdam Meyers
Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA
MUSTANG PANDA
2018-05-21CrowdStrikeKaran Sood
An In-Depth Analysis of Samsam Ransomware and BOSS SPIDER
SamSam
2018-05-18CrowdStrikeAdam Meyers
Meet CrowdStrike’s Adversary of the Month for May: MYTHIC LEOPARD
Operation C-Major
2018-02-08CrowdStrikeAdam Meyers
Meet CrowdStrike’s Adversary of the Month for February: MUMMY SPIDER
Emotet MUMMY SPIDER
2018-01-25CrowdStrikeIan Barton, Jason Barnes, Karan Sood, Ryan McCombs
WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat?
WannaMine
2018-01-25CrowdStrikeIan Barton, Jason Barnes, Karan Sood, Ryan McCombs
WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat?
WannaMine
2018-01-25CrowdStrikeIan Barton, Jason Barnes, Karan Sood, Ryan McCombs
WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat?
WannaMine
2018-01-25CrowdStrikeIan Barton, Jason Barnes, Karan Sood, Ryan McCombs
WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat?
WannaMine
2018-01-01CrowdStrikeCrowdStrike
2018 Global Threat Report
Mangzamel BAMBOO SPIDER HOUND SPIDER ZOMBIE SPIDER
2017-12-20CrowdStrikeAdam Kozy
An End to “Smash-and-Grab” and a Move to More Targeted Approaches
CHINACHOPPER
2017-11-10CrowdStrikeKaran Sood
CCleaner Stage 2: In-Depth Analysis of the Payload
CCleaner Backdoor
2017-10-04CrowdStrikeKaran Sood
Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor
CCleaner Backdoor
2017-07-03CrowdStrikeKaran Sood, Shaun Hurley
NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery
EternalPetya
2017-07-03CrowdStrikeKaran Sood, Shaun Hurley
NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery
EternalPetya
2017-06-28CrowdStrikeFalcon Intelligence Team
CrowdStrike Protects Against NotPetya Attack
EternalPetya
2017-04-13CrowdStrikeFalcon Intelligence Team
Inside the Takedown of ZOMBIE SPIDER and the Kelihos Botnet
Kelihos ZOMBIE SPIDER
2016-10-01CrowdStrikeCrowdStrike
2015 Global Threat Report
MIMIC SPIDER
2016-08-13CrowdStrikeChris Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
FOXY PANDA POISONUS PANDA