https://ift.tt/prcPCqG How To Prepare For Your Virtual Doctor Visit To Get The Most From Your Consultation
https://ift.tt/prcPCqG How To Prepare For Your Virtual Doctor Visit To Get The Most From Your Consultation
- Get link
- X
- Other Apps
Cybersecurity experts have uncovered a concerning development following the recent CrowdStrike Falcon sensor issue that affected Windows systems on July 19, 2024. Threat actors are now actively exploiting this incident to target CrowdStrike customers through various malicious activities.
The original issue stemmed from a content update for the CrowdStrike Falcon sensor on Windows hosts, which caused system crashes and blue screens on affected machines.
While CrowdStrike quickly identified, isolated, and deployed a fix for the problem, opportunistic hackers have seized upon the situation to launch new attacks.
Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo
CrowdStrike Intelligence has reported several tactics being employed by these malicious actors:
To support these malicious activities, numerous domains impersonating CrowdStrike’s brand were identified on July 19, 2024.
crowdstrike.phpartners[.]org
crowdstrike0day[.]com
crowdstrikebluescreen[.]com
crowdstrike-bsod[.]com
crowdstrikeupdate[.]com
crowdstrikebsod[.]com
www.crowdstrike0day[.]com
www.fix-crowdstrike-bsod[.]com
crowdstrikeoutage[.]info
www.microsoftcrowdstrike[.]com
crowdstrikeodayl[.]com
crowdstrike[.]buzz
www.crowdstriketoken[.]com
www.crowdstrikefix[.]com
fix-crowdstrike-apocalypse[.]com
microsoftcrowdstrike[.]com
crowdstrikedoomsday[.]com
crowdstrikedown[.]com
whatiscrowdstrike[.]com
crowdstrike-helpdesk[.]com
crowdstrikefix[.]com
fix-crowdstrike-bsod[.]com
crowdstrikedown[.]site
crowdstuck[.]org
crowdfalcon-immed-update[.]com
crowdstriketoken[.]com
crowdstrikeclaim[.]com
crowdstrikeblueteam[.]com
crowdstrikefix[.]zip
crowdstrikereport[.]com
While some of these domains may not currently host malicious content, they could be used in future social engineering operations.
In response to these emerging threats, CrowdStrike Intelligence strongly advises organizations to:
It’s important to note that the original CrowdStrike issue was not a security incident or cyberattack but rather a technical defect in a content update for Windows hosts. Mac and Linux systems were not affected by this problem.
As the situation evolves, organizations are advised to stay informed through official CrowdStrike channels and implement robust security measures to protect against these opportunistic attacks.
Join our free webinar to learn about combating slow DDoS attacks, a major threat today.
The post Alert! Hackers Exploiting CrowdStrike Issue in Cyber Attacks appeared first on Cyber Security News.
Comments
Post a Comment
Commenter vous !