Day

July 5, 2017
NotPetya Technical Analysis Part II Executive Summary This NotPetya technical analysis is a continuation of the previous technical blog (NotPetya Technical Analysis – A Triple Threat: File Encryption, MFT Encryption, Credential Theft) describing the threat of NotPetya, a destructive malware with self-propagation capabilities. After further analysis, CrowdStrike researchers discovered: How the NotPetya DLL loads functions...
Read More