CrowdStrike Intelligence Team

SCATTERED SPIDER Exploits Windows Security Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security
CrowdStrike Falcon® Platform Identifies Supply Chain Attack via a Trojanized Comm100 Chat Installer
Callback Malware Campaigns Impersonate CrowdStrike and Other Cybersecurity Companies
Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities
Access Brokers: Who Are the Targets, and What Are They Worth?
Lessons Learned From Successive Use of Offensive Cyber Operations Against Ukraine and What May Be Next
Technical Analysis of the WhisperGate Malicious Bootloader
Log4j2 Vulnerability "Log4Shell" (CVE-2021-44228)
ECX: Big Game Hunting on the Rise Following a Notable Reduction in Activity
Big Game Hunting TTPs Continue to Shift After DarkSide Pipeline Attack
Increasing Relevance of Access Broker Market Shown in Improved ECX Model
SUNSPOT: An Implant in the Build Process