Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-05-21CrowdStrikeKaran Sood
@online{sood:20180521:indepth:247dedb, author = {Karan Sood}, title = {{An In-Depth Analysis of Samsam Ransomware and BOSS SPIDER}}, date = {2018-05-21}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/an-in-depth-analysis-of-samsam-ransomware-and-boss-spider/}, language = {English}, urldate = {2019-12-20} } An In-Depth Analysis of Samsam Ransomware and BOSS SPIDER
SamSam
2017-11-10CrowdStrikeKaran Sood
@online{sood:20171110:ccleaner:99ee315, author = {Karan Sood}, title = {{CCleaner Stage 2: In-Depth Analysis of the Payload}}, date = {2017-11-10}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/in-depth-analysis-of-the-ccleaner-backdoor-stage-2-dropper-and-its-payload/}, language = {English}, urldate = {2019-12-20} } CCleaner Stage 2: In-Depth Analysis of the Payload
CCleaner Backdoor
2017-10-04CrowdStrikeKaran Sood
@online{sood:20171004:protecting:31b337c, author = {Karan Sood}, title = {{Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor}}, date = {2017-10-04}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/}, language = {English}, urldate = {2019-12-20} } Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor
CCleaner Backdoor
2017-07-03CrowdStrikeShaun Hurley, Karan Sood
@online{hurley:20170703:notpetya:1453645, author = {Shaun Hurley and Karan Sood}, title = {{NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery}}, date = {2017-07-03}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/petrwrap-technical-analysis-part-2-further-findings-and-potential-for-mbr-recovery/}, language = {English}, urldate = {2019-12-20} } NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery
EternalPetya