Inthe wake of a recent software update CrowdStrike, which led to a majordisruption affecting millions of Windows systems, threat actors have seized theopportunity to launch targeted cyber-attacks. As companies scramble to addressissues caused by the faulty update, researchers and government agencies havenoted a troubling uptick in phishing attempts and malware distribution aimed atexploiting the chaos.
Increased Phishing Scams Amidst CrowdStrike Outage
CrowdStrike’s problematic content update led to significantcrashes across Windows hosts globally. The company has since issued astatement, confirming its commitment to assisting affected customers and urgingvigilance.
George Kurtz, CEO of CrowdStrike, emphasized the importanceof verifying communication through official channels: “I encourage everyone toremain vigilant and ensure that you’re engaging with official CrowdStrikerepresentatives. Our blog and technical support will continue to be theofficial channels for the latest updates.”
The U.K. National Cyber Security Center (NCSC) has reporteda rise in phishing emails aimed at exploiting the outage. Automated malwareanalysis platform AnyRun observed a surge in attempts to impersonateCrowdStrike, which could lead to successful phishing attacks.
Malware Masquerading as Updates
Cybersecurity researcher g0njxa highlighted a maliciouscampaign targeting BBVA bank customers. Attackers offered a fake CrowdStrikehotfix through a phishing site disguised as a BBVA Intranet portal. Thisfraudulent update was actually a vehicle for the Remcos remote access tool.
The deceptive update was accompanied by instructions urgingemployees to install it to avoid connectivity errors. Once executed, the fakeupdate deployed HijackLoader, which then installed Remcos on the compromisedsystem.
In another alarming development, AnyRun reported that someattackers are distributing a data wiper disguised as a CrowdStrike update. Thismalicious software obliterates files on affected systems, reporting its actionsover Telegram. The pro-Iranian hacktivist group Handala claimed responsibility,sending phishing emails from a domain resembling CrowdStrike’s and targetingIsraeli companies.
These emails contained PDFs with instructionsfor running the fake update, linking to a ZIP archive with a maliciousexecutable named 'Crowdstrike.exe.' Upon execution, the data wiper was extractedand activated, leading to data destruction.The Scope of the Disruption
The impact of CrowdStrike’s update failure was substantial.According to Microsoft, the glitch affected approximately 8.5 million Windowsdevices, a small fraction but significant in scope, causing widespreaddisruptions in flights, financial institutions, hospitals, media organizations,railways, and emergency services.
CrowdStrike’s post-mortem blog reveals that the issuestemmed from a channel file update for Windows hosts (version 7.11 and above),which triggered a logic error and subsequent crashes. While the faulty file hasbeen identified and corrected, companies still grappling with systemrestorations are encouraged to follow CrowdStrike’s guidance for recoveringindividual hosts, BitLocker Keys, and cloud environments.
As the situation continues to evolve, stayinginformed and cautious is crucial. Ensure all updates and communications areverified through official CrowdStrike channels to avoid falling victim to theseopportunistic cyber threats.What Are Indicators of Compromise (IoCs)?
Cybercriminals are capitalizing on the CrowdStrike BlueScreen of Death (BSOD) error by distributing malware disguised as a fix. In onescheme, attackers are sending phishing emails with a ZIP file named“crowdstrike-hotfix.zip,” which actually deploys the Remcos RAT malware.
Indicators of Compromise (IoCs):
fef212ec979f2fe2f48641160aadeb86b83f7b35
66fbe2b33e545062a1399a4962b9af4fbbd4b356
5b2f56953b3c925693386cae5974251479f03928
4491901eff338ab52c85a77a3fbd3ce80fda738046ee3b7da7be468da5b331a3
19001dd441e50233d7f0addb4fcd405a70ac3d5e310ff20b331d6f1a29c634f0
213.5.130.58
Additionally, malicious Microsoft Word documents withharmful macro code have been observed. Enabling and executing these macros canresult in the download of information-stealing malware.
Indicators of Compromise (IoCs):
803727ccdf441e49096f3fd48107a5fe55c56c080f46773cd649c9e55ec1be61
4ad9845e691dd415420e0c253ba452772495c0b971f48294b54631e79a22644a
172.104.160.126
Be vigilant for indicators of compromises (IoCs) that maysignal malicious activity. Here are some of the suspicious domains that can beused by threat actors:
How do I Remediate Impacted Hosts?
If hosts are still crashing and unable to stay online toreceive the Channel File update, the remediation steps below can be used.
How do I Remediate Individual Hosts? Updated 2024-07-21 0932 UTC
Reboot the host to give it an opportunity to download thereverted channel file. We strongly recommend putting the host on a wirednetwork (as opposed to WiFi) prior to rebooting as the host will acquireinternet connectivity considerably faster via ethernet.
If the host crashes again on reboot:
· Option 1 – Manual
Please see this Microsoft article for detailed steps.
Note: Bitlocker-encrypted hosts may require a recovery key.
· Option 2 – Automated via bootable USB key
Follow the instructions in this KB article (pdf) or log into view in the support portal.
Note: Bitlocker-encrypted hosts may require arecovery key.