Click here to download all references as Bib-File.•
2022-12-19
⋅
CrowdStrike
⋅
Malware Analysis: GuLoader Dissection Reveals New Anti-Analysis Techniques and Code Injection Redundancy CloudEyE |
2022-12-02
⋅
CrowdStrike
⋅
Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies |
2022-10-26
⋅
CrowdStrike
⋅
CrowdStrike Identifies New Kiss-a-Dog Cryptojacking Campaign Targeting Vulnerable Docker and Kubernetes Infrastructure xmrig Kiss-a-Dog |
2022-09-26
⋅
CrowdStrike
⋅
The Anatomy of Wiper Malware, Part 3: Input/Output Controls CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper Meteor Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare |
2022-08-24
⋅
CrowdStrike
⋅
The Anatomy of Wiper Malware, Part 2: Third-Party Drivers |
2022-08-12
⋅
CrowdStrike
⋅
The Anatomy of Wiper Malware, Part 1: Common Techniques Apostle CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper IsraBye KillDisk Meteor Olympic Destroyer Ordinypt Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare |
2022-06-23
⋅
CrowdStrike
⋅
The Call Is Coming from Inside the House: CrowdStrike Identifies Novel Exploit in VOIP Appliance (CVE-2022-29499) |
2022-06-02
⋅
CrowdStrike
⋅
CrowdStrike Uncovers New MacOS Browser Hijacking Campaign Choziosi |
2022-05-25
⋅
CrowdStrike
⋅
Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun BPFDoor |
2022-05-20
⋅
CrowdStrike
⋅
Mirai Malware Variants for Linux Double Down on Stronger Chips in Q1 2022 Mirai |
2022-05-11
⋅
CrowdStrike
⋅
IceApple: A Novel Internet Information Services (IIS) Post-Exploitation Framework |
2022-05-11
⋅
CrowdStrike
⋅
Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework |
2022-05-06
⋅
CrowdStrike
⋅
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis Lador |
2022-05-06
⋅
CrowdStrike
⋅
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis EvilQuest FlashBack Shlayer XCSSET |
2022-05-04
⋅
CrowdStrike
⋅
Compromised Docker Honeypots Used for Pro-Ukrainian DoS Attack |
2022-04-21
⋅
CrowdStrike
⋅
LemonDuck Targets Docker for Cryptomining Operations Lemon Duck |
2022-04-01
⋅
CrowdStrike
⋅
BERT Embeddings: A Modern Machine-learning Approach for Detecting Malware from Command Lines (Part 2 of 2) |
2022-03-31
⋅
CrowdStrike
⋅
Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365 |
2022-03-30
⋅
CrowdStrike
⋅
Who is EMBER BEAR? WhisperGate |
2022-03-23
⋅
CrowdStrike
⋅
Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack BlackCat |