Artwork

İçerik Joseph Smith and Trey Scott tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Joseph Smith and Trey Scott veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Player FM - Podcast Uygulaması
Player FM uygulamasıyla çevrimdışı Player FM !

What's Next After The Crowdstrike Outage!

1:56:31
 
Paylaş
 

Fetch error

Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on September 10, 2024 09:09 (2M ago)

What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.

Manage episode 439079550 series 3523755
İçerik Joseph Smith and Trey Scott tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Joseph Smith and Trey Scott veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

Cybersecurity firm CrowdStrike faced worldwide IT disruptions due to a flawed update, which opened the door for cybercriminals to distribute Remcos RAT malware under the guise of providing a hotfix to Latin America-based customers.

The hackers who took advantage of the CrowdStrike outage employed several tactics to exploit the situation:

  1. Malware Distribution: Cybercriminals, particularly targeting Latin American customers, distributed a malicious ZIP archive named "crowdstrike-hotfix.zip". This archive contained:
  2. A malware loader called Hijack Loader (also known as DOILoader or IDAT Loader)
  3. The Remcos RAT (Remote Access Trojan) payload
  4. A text file with Spanish instructions urging targets to run an executable
  5. Phishing Campaigns: Hackers launched phishing attempts by sending emails posing as CrowdStrike customer support. These emails aimed to deceive users seeking assistance during the outage.
  6. Domain Impersonation: Malicious actors quickly set up typosquatting domains to impersonate CrowdStrike. Examples of suspicious domain registrations include 'dstrikeuescreen.]com' and 'crowrike0[.]com'.
  7. Social Engineering: Some attackers impersonated CrowdStrike staff or other tech specialists, attempting to obtain login credentials from affected users. They offered fake assistance to exploit the confusion caused by the outage.
  8. Fraudulent Services: Cybercriminals advertised services to companies affected by the issue, requesting cryptocurrency payments in return.
  9. Fake Software Patches: Attackers distributed counterfeit software patches, claiming to fix the issues caused by the CrowdStrike outage.
  10. Targeted Attacks: The campaign primarily focused on Latin America-based CrowdStrike customers, as evidenced by the Spanish-language files and instructions in the malicious ZIP archive.
  11. Exploiting IT Professionals: Hackers specifically targeted IT managers and professionals who were frantically trying to resolve the outage issues, as they were more likely to fall for scams promising quick fixes

  continue reading

44 bölüm

Artwork
iconPaylaş
 

Fetch error

Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on September 10, 2024 09:09 (2M ago)

What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.

Manage episode 439079550 series 3523755
İçerik Joseph Smith and Trey Scott tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Joseph Smith and Trey Scott veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

Cybersecurity firm CrowdStrike faced worldwide IT disruptions due to a flawed update, which opened the door for cybercriminals to distribute Remcos RAT malware under the guise of providing a hotfix to Latin America-based customers.

The hackers who took advantage of the CrowdStrike outage employed several tactics to exploit the situation:

  1. Malware Distribution: Cybercriminals, particularly targeting Latin American customers, distributed a malicious ZIP archive named "crowdstrike-hotfix.zip". This archive contained:
  2. A malware loader called Hijack Loader (also known as DOILoader or IDAT Loader)
  3. The Remcos RAT (Remote Access Trojan) payload
  4. A text file with Spanish instructions urging targets to run an executable
  5. Phishing Campaigns: Hackers launched phishing attempts by sending emails posing as CrowdStrike customer support. These emails aimed to deceive users seeking assistance during the outage.
  6. Domain Impersonation: Malicious actors quickly set up typosquatting domains to impersonate CrowdStrike. Examples of suspicious domain registrations include 'dstrikeuescreen.]com' and 'crowrike0[.]com'.
  7. Social Engineering: Some attackers impersonated CrowdStrike staff or other tech specialists, attempting to obtain login credentials from affected users. They offered fake assistance to exploit the confusion caused by the outage.
  8. Fraudulent Services: Cybercriminals advertised services to companies affected by the issue, requesting cryptocurrency payments in return.
  9. Fake Software Patches: Attackers distributed counterfeit software patches, claiming to fix the issues caused by the CrowdStrike outage.
  10. Targeted Attacks: The campaign primarily focused on Latin America-based CrowdStrike customers, as evidenced by the Spanish-language files and instructions in the malicious ZIP archive.
  11. Exploiting IT Professionals: Hackers specifically targeted IT managers and professionals who were frantically trying to resolve the outage issues, as they were more likely to fall for scams promising quick fixes

  continue reading

44 bölüm

Tüm bölümler

×
 
Loading …

Player FM'e Hoş Geldiniz!

Player FM şu anda sizin için internetteki yüksek kalitedeki podcast'leri arıyor. En iyi podcast uygulaması ve Android, iPhone ve internet üzerinde çalışıyor. Aboneliklerinizi cihazlar arasında eş zamanlamak için üye olun.

 

Hızlı referans rehberi