X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
Peer-to-Peer Poisoning Attack Against The Kelihos.C Botnet

Peer-to-Peer Poisoning Attack against the Kelihos.C Botnet

Almost one year ago, CrowdStrike and some partners conducted a takeover operation against the Kelihos.B botnet, a peer-to-peer network of…

READ MORE
Free Community Tool: CrowdInspect

Free Community Tool: CrowdInspect

CrowdInspect is a free community tool for Microsoft Windows systems from CrowdStrike aimed to help alert you to the presence…

READ MORE
CrowdStrike Falcon Unveiled: The Power Of The Platform

CrowdStrike Falcon Unveiled: The Power of The Platform

It’s been almost a year to the day since we announced the formation of CrowdStrike, a company totally focused on…

READ MORE
I/O You Own: Windows 8 Update

I/O You Own: Windows 8 Update

At SyScan 2012 last year, I debuted research on how to bypass the Operating System’s normal input/output (I/O) disk driver…

READ MORE
HTTP Iframe Injecting Linux Rootkit

HTTP iframe Injecting Linux Rootkit

On Tuesday, November 13, 2012, a previously unknown Linux rootkit was posted to the Full Disclosure mailing list by an…

READ MORE
Unpacking Dynamically Allocated Code

Unpacking Dynamically Allocated Code

Background   Today, most malware is obfuscated to make it more difficult for traditional antivirus engines to detect the malicious…

READ MORE
FinSpy Mobile: IOS And Apple UDID Leak

FinSpy Mobile: iOS and Apple UDID leak

Last week, Morgan Marquis-Boire and Bill Marczak from The Citizen Lab published  a fascinating glance at real-world mobile espionage tool…

READ MORE
Upcoming Black Hat USA 2012: Android 4.0.1 Exploitation

Upcoming Black Hat USA 2012: Android 4.0.1 Exploitation

This February in the "Hacking Exposed: Mobile RATs" talk at the RSA conference, we released a demonstration of an end to end compromise…

READ MORE
Streamlining The Reverse Engineering Process With CrowdRE

Streamlining the Reverse Engineering Process with CrowdRE

Background As is commonly known in the industry, and as evident from recent high-profile malware samples such as Stuxnet and…

READ MORE
Join The Crowd!

Join the Crowd!

Reversing complex software quickly is challenging due to the lack of professional tools that support collaborative analysis. The CrowdRE project…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial