Click here to download all references as Bib-File.
2023-04-16 ⋅ YouTube (botconf eu) ⋅ Tracking Bumblebee’s Development BumbleBee |
2023-03-30 ⋅ CrowdStrike ⋅ 2023-03-29 // SITUATIONAL AWARENESS // CrowdStrike Tracking Active Intrusion Campaign Targeting 3CX Customers 3CX Backdoor |
2023-03-29 ⋅ CrowdStrike ⋅ CrowdStrike Falcon Platform Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers 3CX Backdoor |
2023-03-14 ⋅ CrowdStrike ⋅ The Zeus Trojan Malware - Definition and Prevention Zeus |
2023-03-02 ⋅ CrowdStrike ⋅ Crowdstrike Global Threat Report 2023 |
2023-03-01 ⋅ CrowdStrike ⋅ Slippy Spider LAPSUS |
2022-12-19 ⋅ CrowdStrike ⋅ Malware Analysis: GuLoader Dissection Reveals New Anti-Analysis Techniques and Code Injection Redundancy CloudEyE |
2022-12-02 ⋅ CrowdStrike ⋅ Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies |
2022-09-26 ⋅ CrowdStrike ⋅ The Anatomy of Wiper Malware, Part 3: Input/Output Controls CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper Meteor Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare |
2022-08-24 ⋅ CrowdStrike ⋅ The Anatomy of Wiper Malware, Part 2: Third-Party Drivers |
2022-08-12 ⋅ CrowdStrike ⋅ The Anatomy of Wiper Malware, Part 1: Common Techniques Apostle CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper IsraBye KillDisk Meteor Olympic Destroyer Ordinypt Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare |
2022-06-02 ⋅ CrowdStrike ⋅ CrowdStrike Uncovers New MacOS Browser Hijacking Campaign Choziosi |
2022-05-25 ⋅ CrowdStrike ⋅ Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun BPFDoor |
2022-05-20 ⋅ CrowdStrike ⋅ Mirai Malware Variants for Linux Double Down on Stronger Chips in Q1 2022 Mirai |
2022-05-11 ⋅ CrowdStrike ⋅ Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework |
2022-05-11 ⋅ CrowdStrike ⋅ IceApple: A Novel Internet Information Services (IIS) Post-Exploitation Framework |
2022-05-06 ⋅ CrowdStrike ⋅ macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis Lador |
2022-05-06 ⋅ CrowdStrike ⋅ macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis EvilQuest FlashBack Shlayer XCSSET |
2022-05-04 ⋅ CrowdStrike ⋅ Compromised Docker Honeypots Used for Pro-Ukrainian DoS Attack |
2022-04-21 ⋅ CrowdStrike ⋅ LemonDuck Targets Docker for Cryptomining Operations Lemon Duck |