Click here to download all references as Bib-File.
2022-12-19 ⋅ CrowdStrike ⋅ Malware Analysis: GuLoader Dissection Reveals New Anti-Analysis Techniques and Code Injection Redundancy CloudEyE |
2022-12-02 ⋅ CrowdStrike ⋅ Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies |
2022-09-26 ⋅ CrowdStrike ⋅ The Anatomy of Wiper Malware, Part 3: Input/Output Controls CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper Meteor Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare |
2022-08-24 ⋅ CrowdStrike ⋅ The Anatomy of Wiper Malware, Part 2: Third-Party Drivers |
2022-08-12 ⋅ CrowdStrike ⋅ The Anatomy of Wiper Malware, Part 1: Common Techniques Apostle CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper IsraBye KillDisk Meteor Olympic Destroyer Ordinypt Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare |
2022-06-02 ⋅ CrowdStrike ⋅ CrowdStrike Uncovers New MacOS Browser Hijacking Campaign Choziosi |
2022-05-25 ⋅ CrowdStrike ⋅ Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun BPFDoor |
2022-05-20 ⋅ CrowdStrike ⋅ Mirai Malware Variants for Linux Double Down on Stronger Chips in Q1 2022 Mirai |
2022-05-11 ⋅ CrowdStrike ⋅ Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework |
2022-05-11 ⋅ CrowdStrike ⋅ IceApple: A Novel Internet Information Services (IIS) Post-Exploitation Framework |
2022-05-06 ⋅ CrowdStrike ⋅ macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis EvilQuest FlashBack Shlayer XCSSET |
2022-05-06 ⋅ CrowdStrike ⋅ macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis Lador |
2022-05-04 ⋅ CrowdStrike ⋅ Compromised Docker Honeypots Used for Pro-Ukrainian DoS Attack |
2022-04-21 ⋅ CrowdStrike ⋅ LemonDuck Targets Docker for Cryptomining Operations Lemon Duck |
2022-04-01 ⋅ CrowdStrike ⋅ BERT Embeddings: A Modern Machine-learning Approach for Detecting Malware from Command Lines (Part 2 of 2) |
2022-03-31 ⋅ CrowdStrike ⋅ Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365 |
2022-03-30 ⋅ CrowdStrike ⋅ Who is EMBER BEAR? WhisperGate |
2022-03-23 ⋅ CrowdStrike ⋅ Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack BlackCat |
2022-03-14 ⋅ CrowdStrike ⋅ Falcon OverWatch Threat Hunting Uncovers Ongoing NIGHT SPIDER Zloader Campaign Zloader |
2022-03-07 ⋅ CrowdStrike ⋅ PROPHET SPIDER Exploits Citrix ShareFile Remote Code Execution Vulnerability CVE-2021-22941 to Deliver Webshell |