Fake CrowdStrike fixes target companies with malware, data wipers

Fake CrowdStrike fixes target companies with malware, data wipers

July 21, 2024 at 07:35PM

Threat actors are exploiting the CrowdStrike glitch by targeting companies with data wipers and remote access tools. CrowdStrike is actively assisting affected customers and warns about phishing attempts. Malware campaigns impersonate CrowdStrike to distribute RATs and wipers. The faulty update affected 8.5 million Windows devices, leading to widespread disruption. CrowdStrike offers guidance for system recovery.

Based on the meeting notes, the key takeaways are:

1. CrowdStrike’s glitchy update on Friday resulted in threat actors exploiting the situation to target companies with data wipers and remote access tools, as well as an increase in phishing emails taking advantage of the disruption.

2. CrowdStrike has issued an official update, advising customers to communicate through official channels to avoid exploitation by adversaries and bad actors.

3. Cybersecurity researchers have identified malware campaigns that involve phishing sites offering fake CrowdStrike updates, such as a fake hotfix targeting BBVA bank customers and a data wiper distributed by a pro-Iranian hacktivist group.

4. The faulty CrowdStrike update affected 8.5 million Windows devices, causing significant disruptions across various industries.

5. CrowdStrike has provided instructions for affected companies to recover individual hosts, BitLocker Keys, and cloud-based environments.

These takeaways highlight the urgency for companies to remain vigilant, communicate through official channels, and take necessary steps to recover from the impact of the faulty update.

Full Article