Counter Adversary Operations

Secure Your Staff: How to Protect High-Profile Employees' Sensitive Data on the Web
Kovter Killer: How to Remediate the APT of Clickjacking
CrowdStrike’s 2018 Global Threat Report Reveals the Trends, Insights and Threat Actors You Need to Know
Seeing into the Shadows: Tackling ChromeOS Blind Spots with Dell and CrowdStrike
Spotlight on the Log-Structured Merge (LSM) Tree: One of the Keys Enabling CrowdStrike to Process Trillions of Events per Day
5 Common Hybrid IT Security Challenges and How to Overcome Them
The Imperative to Secure Identities: Key Takeaways from Recent High-Profile Breaches
Making Sense of the Dark Web with Falcon Intelligence Recon+
Announcing CrowdStrike Falcon Counter Adversary Operations Elite
WebAssembly Is Abused by eCriminals to Hide Malware
CrowdStrike’s Advanced Memory Scanning Stops Threat Actor Using BRc4 at Telecommunications Customer
Discovering and Blocking a Zero-Day Exploit with CrowdStrike Falcon Complete: The Case of CVE-2023-36874
Compromised NPM Package Used in Supply Chain Attack: CrowdStrike Falcon® Customers Protected
CrowdStrike Named a Leader in Frost & Sullivan’s 2022 Frost Radar for Cyber Threat Intelligence
Falcon Insight XDR and Falcon LogScale: What You Need to Know
Hypervisor Jackpotting, Part 2: eCrime Actors Increase Targeting of ESXi Servers with Ransomware
CrowdStrike Falcon® Detects 100% of Attacks in New SE Labs EDR Test, Winning Highest Rating
QakBot eCrime Campaign Leverages Microsoft OneNote Attachments
Make Cloud Defense a Team Sport by Turning DevOps into a Force Multiplier
CrowdStrike Research Investigates Exploit Behavior to Strengthen Customer Protection
SCATTERED SPIDER Exploits Windows Security Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security
CrowdStrike Named a Leader in Frost & Sullivan CWPP Radar, Demonstrating Strong Innovation and Growth
Explore the Adversary Universe
CrowdStrike Falcon® Proactively Protects Against Wiper Malware as CISA Warns U.S. Companies of Potential Attacks
CrowdStrike Falcon® Platform Identifies Supply Chain Attack via a Trojanized Comm100 Chat Installer
Adversary Quest 2022 Walkthrough, Part 3: Four PROTECTIVE PENGUIN Challenges
Adversary Quest 2022 Walkthrough, Part 2: Four TABLOID JACKAL Challenges
Adversary Quest 2022 Walkthrough, Part 1: Four CATAPULT SPIDER Challenges
Callback Malware Campaigns Impersonate CrowdStrike and Other Cybersecurity Companies
Hunting for the Confluence Exploitation: When Falcon OverWatch Becomes the First Line of Defense
Capture the Flag: CrowdStrike Intelligence Adversary Quest 2022
For the Common Good: How to Compromise a Printer in Three Simple Steps
Multi-Layered Prevention for the Endpoint
CrowdStrike Delivers Cyber Resilience for the Airline Industry to Meet New TSA Requirements
Another Brick in the Wall: eCrime Groups Leverage SonicWall VPN Vulnerability
Who is EMBER BEAR?
Preventing Exploitation of the ZIP File Format
PROPHET SPIDER Exploits Citrix ShareFile Remote Code Execution Vulnerability CVE-2021-22941 to Deliver Webshell
For the Common Good: How to Compromise a Printer in Three Simple Steps
Access Brokers: Who Are the Targets, and What Are They Worth?
LemonDuck Targets Docker for Cryptomining Operations
TellYouThePass Ransomware Analysis Reveals a Modern Reinterpretation Using Golang
Log4j2 Vulnerability "Log4Shell" (CVE-2021-44228)
CrowdStrike’s Artificial Intelligence Tooling Uses Similarity Search to Analyze Script-Based Malware Attack Techniques
Endpoint Protection and Threat Intelligence: The Way Forward [VIDEO]
Ploutus ATM Malware Case Study: Automated Deobfuscation of a Strongly Obfuscated .NET Binary
Scheming with URLs: One-Click Attack Surface in Linux Desktop Environments
CARBON SPIDER Embraces Big Game Hunting, Part 2
ECX: Big Game Hunting on the Rise Following a Notable Reduction in Activity
How Artificial Intelligence is Becoming a Key Weapon in the Cybersecurity War
Sidoh: WIZARD SPIDER’s Mysterious Exfiltration Tool
CARBON SPIDER Embraces Big Game Hunting, Part 1
PROPHET SPIDER Exploits Oracle WebLogic to Facilitate Ransomware Activity
CrowdStrike Announces CrowdStrike Falcon Intelligence Recon+ to Combat Cybercriminals
Adversary Quest 2021 Walkthrough, Part 3: Four PROTECTIVE PENGUIN Challenges
OverWatch Casts a Wide Net for Follina: Hunting Beyond the Proof of Concept
CCleaner Stage 2: In-Depth Analysis of the Payload
Adversary Quest 2021 Walkthrough, Part 2: Four SPACE JACKAL Hacktivist Challenges
Adversary Quest 2021 Walkthrough, Part 1: Four CATAPULT SPIDER eCrime Challenges
See the COMPLETE Picture: New Study Reveals the Benefits of Fully Managed Detection and Response
Hacktivist Entity USDoD Claims to Have Leaked CrowdStrike’s Threat Actor List
Stop Breaches With Complete Confidence? Customers Say Falcon Complete Can
Hypervisor Jackpotting, Part 1: CARBON SPIDER and SPRITE SPIDER Target ESXi Servers With Ransomware to Maximize Impact
Exploiting GlobalProtect for Privilege Escalation, Part Two: Linux and macOS
Pwn2Own: A Tale of a Bug Found and Lost Again
Black Hat 2021: Join Us Virtually or In Person
“Gitting” the Malware: How Threat Actors Use GitHub Repositories to Deploy Malware
New Podcast Series: The Importance of Cyber Threat Intelligence in Cybersecurity
WIZARD SPIDER Update: Resilient, Reactive and Resolute
Double Trouble: Ransomware with Data Leak Extortion, Part 1
BitPaymer Source Code Fork: Meet DoppelPaymer Ransomware and Dridex 2.0
Who Is PIONEER KITTEN?
Exploiting GlobalProtect for Privilege Escalation, Part One: Windows
Exploiting CVE-2021-3490 for Container Escapes
Register Now to Join Us in Las Vegas for Fal.Con 2022
Who is REFINED KITTEN?
WIZARD SPIDER Adds New Features to Ryuk for Targeting Hosts on LAN
Ransomware Increases the Back-to-School Blues
Who is Salty Spider (Sality)?
CrowdStrike Mobile Threat Report Offers Trends and Recommendations for Securing Your Organization
Don’t Take The Vendor’s Word For It: The Importance of Third-Party Testing
Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER
New Evidence Proves Ongoing WIZARD SPIDER / LUNAR SPIDER Collaboration
PINCHY SPIDER Affiliates Adopt “Big Game Hunting” Tactics to Distribute GandCrab Ransomware
"Sin”-ful SPIDERS: WIZARD SPIDER and LUNAR SPIDER Sharing the Same Web
Who is FANCY BEAR (APT28)?
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization
Threat Actor “Magecart”: Coming to an eCommerce Store Near You
Widespread DNS Hijacking Activity Targets Multiple Sectors
Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware
Falcon Zero-Day Flash Detection
Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA
Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware
Meet CrowdStrike’s Adversary of the Month for November: HELIX KITTEN
Customers, Conviction, Speed: A Conversation With George Kurtz, CEO and Co-Founder at CrowdStrike
Meet CrowdStrike’s Adversary of the Month for April: STARDUST CHOLLIMA
Arrests Put New Focus on CARBON SPIDER Adversary Group
CrowdStrike's January Adversary of the Month: VOODOO BEAR
Meet CrowdStrike’s Adversary of the Month for July: WICKED SPIDER
CrowdStrike’s Cloud Security and Observability Capabilities to Be Showcased at KubeCon + CloudNativeCon North America 2022
Why North Korean Cyberwarfare is Likely to Intensify
Software Supply Chain Attacks Gained Traction in 2017 and Are Likely to Continue
Meet CrowdStrike’s Adversary of the Month for August: GOBLIN PANDA
Meet CrowdStrike's Adversary of the Month for February: MUMMY SPIDER
Chip Flaws Spectre and Meltdown are Actually Three Vulnerabilities and Proving Hard to Mitigate
Malicious Spear-Phishing Campaign Targets Upcoming Winter Olympics in South Korea
An End to “Smash-and-Grab” and a Move to More Targeted Approaches
From the Archives: Drop the MIC — CVE-2019-1040
Software Supply Chain Attacks on the Rise, Undermining Customer Trust
Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor
Dealing with Out-of-memory Conditions in Rust
CrowdStrike Protects Against NotPetya Attack
Automation Advancements in Falcon Intelligence Recon: Disrupt the Adversary and Reduce Risk
Inside the MITRE ATT&CK Evaluation: How CrowdStrike’s Elite Managed Services Operate in the Real World
VirusTotal Lookups Are Back in CrowdInspect, CrowdStrike’s Popular Free Tool
Blocking Malicious PowerShell Downloads
CrowdStrike Customers Share Benefits of Cybersecurity Consolidation and Technology Integrations
Bear Hunting: Tracking Down COZY BEAR Backdoors
The Economics of Ransomware: How SCADA/ICS Changes the Equation
Meet CrowdStrike’s Adversary of the Month for October: DUNGEON SPIDER
Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning
Using OS X FSEvents to Discover Deleted Malicious Artifacts
Investigating PowerShell: Command and Script Logging
Nothing else is working. Why not memory forensics?
Sakula Reloaded
Improve Threat Hunting with Long-Term, Cost-Effective Data Retention
Blurring of Commodity and Targeted Attack Malware
CROWDSTRIKE FALCON XDR: Delivered at the Speed and Scale of the CrowdStrike Security Cloud
Rhetoric Foreshadows Cyber Activity in the South China Sea
VENOM Vulnerability Details
3 Tips for Operationalizing Cyber Intelligence
CrowdResponse Release and new @Tasks modules
Operational threat intelligence with Maltego Transform Hub
Adversaries Set Their Sights on Oil and Gas Sector
Surgeon with a Shotgun! - Memory Forensics
Parsing Sysmon Events for IR Indicators
This Year’s CrowdStrike Services Report Offers Observations on 2020 Cyber Threat Trends and Insights for 2021
Sheep Year Kernel Heap Fengshui: Spraying in the Big Kids’ Pool
Advanced Falconry: Seeking Out the Prey with Machine Learning
IR Team Investigations Uncover eCrime Use of Nation-State Attack Methods
Peering Around the Corner
CVE-2014-1761 - The Alley of Compromise
CSO Online: Insights on Cyber Espionage From CrowdStrike VP Mike Sentonas
Occupy Central: The Umbrella Revolution and Chinese Intelligence
Registry Analysis with CrowdResponse
Hardening Neural Networks for Computer Security Against Adversarial Attack
Full Decryption of Systems Encrypted by Petya/NotPetya
*NEW* Community Tool: CrowdStrike Heartbleed Scanner
Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN
CrowdStrike and Google Cloud Expand Strategic Partnership to Deliver Unified Cloud Security
Mo' Shells Mo' Problems - File List Stacking
Mo' Shells Mo' Problems - Network Detection
Mo' Shells Mo' Problems - Deep Panda Web Shells
CrowdStrike Partners with MITRE CTID, Reveals Real-world Insider Threat Techniques
Naming Adversaries and Why It Matters to Your Security Team
Protected Processes Part 3: Windows PKI Internals (Signing Levels, Scenarios, Signers, Root Keys, EKUs & Runtime Signers)
The Evolution of Protected Processes - Part 1: Pass-the-Hash Mitigations in Windows 8.1
Analysis of a CVE-2013-3906 Exploit
Everything You Think You Know About (Storing and Searching) Logs Is Wrong
VICEROY TIGER Delivers New Zero-Day Exploit
DLL Side-Loading: How to Combat Threat Actor Evasion Techniques
Rare Glimpse into a Real-Life Command-and-Control Server
Who is Samurai Panda
Who is Clever Kitten
Whois Numbered Panda
Who is Anchor Panda
Free Community Tool: CrowdInspect
How We Use Apache Airflow at CrowdStrike, Part 1
Unpacking Dynamically Allocated Code
CrowdStrike’s Solution to Help School Districts Meet Cybersecurity Challenges