CrowdStrike

Latest

  • July 8, 2020 Sunnyvale / CA / USA - Crowdstrike headquarters in Silicon Valley; CrowdStrike Holdings, Inc. is a cyber-security technology company

    SolarWinds hackers also targeted security firm CrowdStrike

    by 
    Karissa Bell
    Karissa Bell
    12.24.2020

    The group behind the SolarWinds hack also tried to compromise CrowdStrike, a top security firm.

  • Illustration by Koren Shadmi

    Coronavirus bursts Big Tech’s bubble

    by 
    Violet Blue
    Violet Blue
    02.28.2020

    Virus enthusiasts from all over the world converged in San Francisco this week for America's largest security event: RSA Conference 2020. Before it began, fourteen companies withdrew from RSAC over concerns about the impending Coronavirus (COVID-19) pandemic. On opening day, organizers sent a message through the conference app asking attendees to stop greeting each other with handshakes.

  • solarseven via Getty Images

    Ryuk ransomware banks $3.7 million in five months

    by 
    Jon Fingas
    Jon Fingas
    01.14.2019

    The Ryuk ransomware hasn't just causing grief for newspapers -- it's also quite lucrative for its operators. Researchers at CrowdStrike and FireEye both estimate that the code has produced the equivalent of $3.7 million in bitcoin since August, spread across 52 payments. The key, analysts note, is the willingness to be patient and focus on big targets.

  • Reuters/Carlos Barria

    FBI says DNC wouldn't give it direct access to hacked servers

    by 
    Jon Fingas
    Jon Fingas
    01.05.2017

    The FBI has spent months trying to persuade people that Russia was behind the DNC hack, but we're now learning that it didn't get much help from the DNC itself. The Bureau tells Buzzfeed News that the Democrats' organization reportedly "rebuffed" multiple requests for physical access to the hacked servers, forcing investigators to depend on the findings of the third-party security firm CrowdStrike (which the DNC contacted after the hack). The FBI would have tackled the breach earlier if the DNC hadn't "inhibited" the investigation, according to its statement.

  • Bill Hinton Photography via Getty

    The clownish fight over who hacked the DNC

    by 
    Violet Blue
    Violet Blue
    06.24.2016

    A war of words has erupted over whether the DNC hack was an act of espionage by the Russian government, between soundbite-ready security firm CrowdStrike and a lone hacker who's unkindly claiming credit. And the conspiracy-theory fans went wild.

  • China accused of hacking US firms even after cyber-peace treaty

    by 
    Daniel Cooper
    Daniel Cooper
    10.19.2015

    A security firm is accusing China of attempting to hack American businesses and steal trade secrets, just weeks after signing a treaty not to. The claims come from researchers at CrowdStrike, which claims to monitor and prevent attacks on US businesses from foreign nations looking to swipe sensitive information. According to Dimitri Alperovitch, seven companies that operate in the technology and pharmaceuticals industries have come under attack in the last three weeks alone.

  • Cyberattacks used security software to cover their trail

    by 
    Jon Fingas
    Jon Fingas
    12.27.2014

    State-sponsored hacking attempts frequently rely on specially written software, but that's a risky move. Unless it's well-made, custom code can be a giveaway as to who's responsible. Attackers are switching things up, however. Security researchers at CrowdStrike and Cymmetria have discovered that a likely cyberwarfare campaign against military-related targets in Europe and Israel used commercial security software to both cover its tracks and improve its features. Typically, the attacks would try to fool people into installing rogue Excel scripts through bogus email. If anyone fell for the ploy, the script installed malware that also grabbed parts of Core Security's defense assessment tool in its attempt to throw investigators off the scent. That's no mean feat -- Core has copy protection and digital watermarks to prevent the software from winding up in the wrong hands, so the perpetrators clearly went out of their way to use it.