
What's Next After The Crowdstrike Outage!
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
-
Narrado por:
-
De:
Acerca de esta escucha
Cybersecurity firm CrowdStrike faced worldwide IT disruptions due to a flawed update, which opened the door for cybercriminals to distribute Remcos RAT malware under the guise of providing a hotfix to Latin America-based customers.
The hackers who took advantage of the CrowdStrike outage employed several tactics to exploit the situation:
- Malware Distribution: Cybercriminals, particularly targeting Latin American customers, distributed a malicious ZIP archive named "crowdstrike-hotfix.zip". This archive contained:
- A malware loader called Hijack Loader (also known as DOILoader or IDAT Loader)
- The Remcos RAT (Remote Access Trojan) payload
- A text file with Spanish instructions urging targets to run an executable
- Phishing Campaigns: Hackers launched phishing attempts by sending emails posing as CrowdStrike customer support. These emails aimed to deceive users seeking assistance during the outage.
- Domain Impersonation: Malicious actors quickly set up typosquatting domains to impersonate CrowdStrike. Examples of suspicious domain registrations include 'dstrikeuescreen.]com' and 'crowrike0[.]com'.
- Social Engineering: Some attackers impersonated CrowdStrike staff or other tech specialists, attempting to obtain login credentials from affected users. They offered fake assistance to exploit the confusion caused by the outage.
- Fraudulent Services: Cybercriminals advertised services to companies affected by the issue, requesting cryptocurrency payments in return.
- Fake Software Patches: Attackers distributed counterfeit software patches, claiming to fix the issues caused by the CrowdStrike outage.
- Targeted Attacks: The campaign primarily focused on Latin America-based CrowdStrike customers, as evidenced by the Spanish-language files and instructions in the malicious ZIP archive.
- Exploiting IT Professionals: Hackers specifically targeted IT managers and professionals who were frantically trying to resolve the outage issues, as they were more likely to fall for scams promising quick fixes
Todavía no hay opiniones