ANY.RUN Shares Report on Threats Exploiting Recent CrowdStrike Outage
DUBAI, UNITED ARAB EMIRATES, July 23, 2024 /EINPresswire.com/ -- ANY.RUN, a provider of interactive sandbox and threat intelligence solutions, has released a report detailing the cyber threats exploiting the recent CrowdStrike outage. The report identifies two main sources of threats: fake websites imitating CrowdStrike's official domain name and malware disguised as updates or bug fixes.
๐๐ซ๐จ๐ฐ๐๐๐ญ๐ซ๐ข๐ค๐ ๐๐ฎ๐ญ๐๐ ๐ ๐๐ฏ๐๐ซ๐ฏ๐ข๐๐ฐ
On July 18, CrowdStrike, a well-known cybersecurity firm, released a faulty update that affected millions of Windows users worldwide. This led to a global outage and significant disruptions, causing users to encounter blue screens of death (BSODs) on their devices.
As users and organizations searched for a solution, cybercriminals seized the opportunity to exploit the situation.
๐ ๐๐ค๐ ๐๐๐๐ฌ๐ข๐ญ๐๐ฌ ๐๐ซ๐๐ญ๐๐ง๐๐ข๐ง๐ ๐ญ๐จ ๐๐ ๐๐ซ๐จ๐ฐ๐๐๐ญ๐ซ๐ข๐ค๐
Following the outage, many websites were created with domain names similar to CrowdStrike's official domain. While some were harmless, others were used for phishing attempts.
ANY.RUN's data shows that the highest number of newly-created fake domains appeared on the first day after the outage. Using ANY.RUN's Threat Intelligence Lookup service, analysts identified over 60 fake domains, which are listed in their report.
๐๐๐ฅ๐ฐ๐๐ซ๐ ๐๐ข๐ฌ๐ ๐ฎ๐ข๐ฌ๐๐ ๐๐ฌ ๐๐ฉ๐๐๐ญ๐๐ฌ
ANY.RUN observed an increase in campaigns spreading malware as updates. One early example was an archive containing Hijackloader, disguised as a CrowdStrike bug fix. When victims opened the file, it installed Remcos, a remote control malware, on their systems.
๐ ๐ ๐๐ค๐ ๐๐ซ๐จ๐ฐ๐๐๐ญ๐ซ๐ข๐ค๐ ๐ ๐ข๐ฑ ๐๐ข๐ฉ๐๐ฌ ๐๐ฌ๐๐ซ๐ฌ' ๐๐๐ญ๐
One of the most sophisticated attacks discovered by ANY.RUN involved a data wiper distributed through a CrowdStrike-themed phishing email and PDF attachment.
The attachment contained an executable that, when launched, asked the user if they wanted to install the update. Upon launching, the wiper erased the system by overwriting files with zero bytes and then reported the successful attack via Telegram.
For the complete report, visit ANY.RUN's blog.
๐๐๐๐จ๐ฆ๐ฆ๐๐ง๐๐๐ญ๐ข๐จ๐ง๐ฌ
ANY.RUN urges users and organizations to remain cautious and verify all updates or hotfixes before installing them. To ensure accurate information and guidance, it is essential to follow CrowdStrike's official statements.
๐๐๐จ๐ฎ๐ญ ๐๐๐.๐๐๐
ANY.RUN is a trusted cybersecurity service used by over 400,000 professionals. It provides an interactive sandbox for simplified malware analysis on Windows and Linux systems, as well as threat intelligence tools like TI Lookup, Yara Search, and Feeds to help users quickly identify IOCs or files, understand threats, and respond to incidents.
The ANY.RUN team
ANYRUN FZCO
+1 657-366-5050
email us here
Visit us on social media:
X
Legal Disclaimer:
EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.
