There were 1,215 press releases posted in the last 24 hours and 441,194 in the last 365 days.

ANY.RUN Shares Report on Threats Exploiting Recent CrowdStrike Outage

DUBAI, UNITED ARAB EMIRATES, July 23, 2024 /EINPresswire.com/ -- ANY.RUN, a provider of interactive sandbox and threat intelligence solutions, has released a report detailing the cyber threats exploiting the recent CrowdStrike outage. The report identifies two main sources of threats: fake websites imitating CrowdStrike's official domain name and malware disguised as updates or bug fixes.

๐‚๐ซ๐จ๐ฐ๐๐’๐ญ๐ซ๐ข๐ค๐ž ๐Ž๐ฎ๐ญ๐š๐ ๐ž ๐Ž๐ฏ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ

On July 18, CrowdStrike, a well-known cybersecurity firm, released a faulty update that affected millions of Windows users worldwide. This led to a global outage and significant disruptions, causing users to encounter blue screens of death (BSODs) on their devices.

As users and organizations searched for a solution, cybercriminals seized the opportunity to exploit the situation.

๐…๐š๐ค๐ž ๐–๐ž๐›๐ฌ๐ข๐ญ๐ž๐ฌ ๐๐ซ๐ž๐ญ๐ž๐ง๐๐ข๐ง๐  ๐ญ๐จ ๐›๐ž ๐‚๐ซ๐จ๐ฐ๐๐’๐ญ๐ซ๐ข๐ค๐ž

Following the outage, many websites were created with domain names similar to CrowdStrike's official domain. While some were harmless, others were used for phishing attempts.

ANY.RUN's data shows that the highest number of newly-created fake domains appeared on the first day after the outage. Using ANY.RUN's Threat Intelligence Lookup service, analysts identified over 60 fake domains, which are listed in their report.

๐Œ๐š๐ฅ๐ฐ๐š๐ซ๐ž ๐ƒ๐ข๐ฌ๐ ๐ฎ๐ข๐ฌ๐ž๐ ๐š๐ฌ ๐”๐ฉ๐๐š๐ญ๐ž๐ฌ

ANY.RUN observed an increase in campaigns spreading malware as updates. One early example was an archive containing Hijackloader, disguised as a CrowdStrike bug fix. When victims opened the file, it installed Remcos, a remote control malware, on their systems.

๐€ ๐…๐š๐ค๐ž ๐‚๐ซ๐จ๐ฐ๐๐’๐ญ๐ซ๐ข๐ค๐ž ๐…๐ข๐ฑ ๐–๐ข๐ฉ๐ž๐ฌ ๐”๐ฌ๐ž๐ซ๐ฌ' ๐ƒ๐š๐ญ๐š

One of the most sophisticated attacks discovered by ANY.RUN involved a data wiper distributed through a CrowdStrike-themed phishing email and PDF attachment.

The attachment contained an executable that, when launched, asked the user if they wanted to install the update. Upon launching, the wiper erased the system by overwriting files with zero bytes and then reported the successful attack via Telegram.

For the complete report, visit ANY.RUN's blog.

๐‘๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ

ANY.RUN urges users and organizations to remain cautious and verify all updates or hotfixes before installing them. To ensure accurate information and guidance, it is essential to follow CrowdStrike's official statements.

๐€๐›๐จ๐ฎ๐ญ ๐€๐๐˜.๐‘๐”๐

ANY.RUN is a trusted cybersecurity service used by over 400,000 professionals. It provides an interactive sandbox for simplified malware analysis on Windows and Linux systems, as well as threat intelligence tools like TI Lookup, Yara Search, and Feeds to help users quickly identify IOCs or files, understand threats, and respond to incidents.

The ANY.RUN team
ANYRUN FZCO
+1 657-366-5050
email us here
Visit us on social media:
X

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.