Click here to download all references as Bib-File.
2021-07-07 ⋅ CrowdStrike ⋅ How CrowdStrike Falcon Stops REvil Ransomware Used in the Kaseya Attack REvil |
2020-05-18 ⋅ CrowdStrike ⋅ DarkSide Goes Dark: How CrowdStrike Falcon Customers Were Protected DarkSide DarkSide |
2018-05-21 ⋅ CrowdStrike ⋅ An In-Depth Analysis of Samsam Ransomware and BOSS SPIDER SamSam |
2018-01-25 ⋅ CrowdStrike ⋅ WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat? WannaMine |
2017-11-10 ⋅ CrowdStrike ⋅ CCleaner Stage 2: In-Depth Analysis of the Payload CCleaner Backdoor |
2017-10-04 ⋅ CrowdStrike ⋅ Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor CCleaner Backdoor |
2017-07-03 ⋅ CrowdStrike ⋅ NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery EternalPetya |