Unpacking Dynamically Allocated Code
Background Today, most malware is obfuscated to make it more difficult for traditional antivirus engines to detect the malicious…
FinSpy Mobile: iOS and Apple UDID leak
Last week, Morgan Marquis-Boire and Bill Marczak from The Citizen Lab published a fascinating glance at real-world mobile espionage tool…
Upcoming Black Hat USA 2012: Android 4.0.1 Exploitation
This February in the "Hacking Exposed: Mobile RATs" talk at the RSA conference, we released a demonstration of an end to end compromise…
Streamlining the Reverse Engineering Process with CrowdRE
Background As is commonly known in the industry, and as evident from recent high-profile malware samples such as Stuxnet and…
Join the Crowd!
Reversing complex software quickly is challenging due to the lack of professional tools that support collaborative analysis. The CrowdRE project…
CrowdStrike Intelligence – Adversary-based Approach
Treating the problem, not the symptoms Having spent the better part of the last 10 years dealing with various cyber…
Kelihos.C: Same Code, New Botnet
Last week, CrowdStrike took control over the Kelihos.B botnet in a joint effort with other security experts. The infected machines…
P2P Botnet Kelihos.B with 100.000 Nodes Sinkholed
This past Wednesday, CrowdStrike has teamed up with security experts from Dell SecureWorks, the Honeynet Project and Kaspersky to take…
CrowdStrike Launch
CrowdStrike launches in stealth-mode with $26 million Series A round led b Warburg Pincus As I mentioned in a previous…