Fake CrowdStrike fixes target companies with malware, data wipers

Share:

Threat actors are exploiting the massive business disruption from CrowdStrike’s glitchy update on Friday to target companies with data wipers and remote access tools.

As businesses are looking for assistance to fix affected Windows hosts, researchers and government agencies have spotted an increase in phishing emails trying to take advantage of the situation.

Official channel communication

In an update today, CrowdStrike says it “is actively assisting customers” impacted by the recent content update that crashed millions of Windows hosts worldwide.

The company advises customers to verify that they communicate with legitimate representatives through official channels since “adversaries and bad actors will try to exploit events like this.”

“I encourage everyone to remain vigilant and ensure that you’re engaging with official CrowdStrike representatives. Our blog and technical support will continue to be the official channels for the latest updates” – George Kurtz, CrowdStrike CEO

The U.K. National Cyber Security Center (NCSC) also warned that it observed an increase in phishing messages aiming to take advantage of the outage.

Automated malware analysis platform AnyRun noticed “an increase in attempts at impersonating CrowdStrike that can potentially lead to phishing” [1, 2, 3].

Malware cloaked as fixes and updates

On Saturday, cybersecurity researcher g0njxa first reported a malware campaign targeting BBVA bank customers that offered a fake CrowdStrike Hotfix update that installs the Remcos RAT.

The fake hotfix was promoted through a phishing site, portalintranetgrupobbva[.]com, which pretended to be a BBVA Intranet portal.

Enclosed in the malicious archive are instructions telling employees and partners to install the update to avoid errors when connecting to the company’s internal network.

“Mandatory update to avoid connection and synchronization errors to the company’s internal network,” reads the ‘instrucciones.txt’ file in Spanish.

AnyRun, who also tweeted about the same campaign, said that the fake hotfix delivers HijackLoader, which then drops the Remcos remote access tool on the infected system.

In another warning, AnyRun announced that attackers are distributing a data wiper under the pretense of delivering an update from CrowdStrike.

“It decimates the system by overwriting files with zero bytes and then reports it over #Telegram,” AnyRun says.

This campaign was claimed by the pro-Iranian hacktivist group Handala, who stated on Twitter that they impersonated CrowdStrike in emails to Israeli companies to distribute the data wiper.

The threat actors impersonated CrowdStrike by sending emails from the domain’ crowdstrike.com.vc,’ telling customers that a tool was created to bring Windows systems back online

The emails include a PDF seen by BleepingComputer that contains further instructions on running the fake update, as well as a link to download a malicious ZIP archive from a file hosting service. This zip file contains an executable named ‘Crowdstrike.exe.’

Once the fake CrowdStrike update is executed, the data wiper is extracted to a folder under %Temp% and launched to destroy data stored on the device.

Millions of Windows hosts crashed

The defect in CrowdStrike’s software update had a massive impact on Windows systems at numerous organizations, making it too good an opportunity for cybercriminals to pass.

According to Microsoft, the faulty update “affected 8.5 million Windows devices, or less than one percent of all Windows machines.”

The damage happened in 78 minutes, between 04:09 UTC and 05:27 UTC.

Despite the low percentage of affected systems and CrowdStrike’s effort to correct the issue quickly, the impact was huge.

Computer crashes led to thousands of flights being canceled, disrupted activity at financial companies, brought down hospitals, media organizations, railways, and even impacted emergency services.

In a post-mortem blog post on Saturday, CrowdStrike explains that the cause of the outage was a channel file (sensor configuration) update to Windows hosts (version 7.11 and above) that triggered a logic error leading to a crash.

While the channel file responsible for the crashes has been identified and no longer causes problems, companies that still struggle to restore systems to normal operations can follow CrowdStrike’s instructions to recover individual hosts, BitLocker Keys, and cloud-based environments.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
8:55 pm, Jan 20, 2025
weather icon 5°C
L: 2° | H: 6°
overcast clouds
Humidity: 89 %
Pressure: 1017 mb
Wind: 6 mph SW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 7:54 am
Sunset: 4:28 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
2° | 6°°C 0 mm 0% 3 mph 89 % 1017 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
3° | 6°°C 0 mm 0% 4 mph 96 % 1017 mb 0 mm/h
Wed Jan 22 9:00 pm
weather icon
4° | 5°°C 1 mm 100% 6 mph 97 % 1009 mb 0 mm/h
Thu Jan 23 9:00 pm
weather icon
3° | 8°°C 1 mm 100% 16 mph 90 % 1006 mb 0 mm/h
Fri Jan 24 9:00 pm
weather icon
4° | 11°°C 1 mm 100% 24 mph 91 % 1005 mb 0 mm/h
Today 9:00 pm
weather icon
3° | 5°°C 0 mm 0% 3 mph 89 % 1017 mb 0 mm/h
Tomorrow 12:00 am
weather icon
3° | 4°°C 0 mm 0% 4 mph 92 % 1017 mb 0 mm/h
Tomorrow 3:00 am
weather icon
3° | 3°°C 0 mm 0% 4 mph 93 % 1016 mb 0 mm/h
Tomorrow 6:00 am
weather icon
3° | 3°°C 0 mm 0% 3 mph 96 % 1015 mb 0 mm/h
Tomorrow 9:00 am
weather icon
3° | 3°°C 0 mm 0% 3 mph 92 % 1015 mb 0 mm/h
Tomorrow 12:00 pm
weather icon
5° | 5°°C 0 mm 0% 4 mph 76 % 1015 mb 0 mm/h
Tomorrow 3:00 pm
weather icon
6° | 6°°C 0 mm 0% 3 mph 75 % 1012 mb 0 mm/h
Tomorrow 6:00 pm
weather icon
4° | 4°°C 0 mm 0% 4 mph 93 % 1011 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€100,800.17
-1.87%
Ethereum(ETH)
€3,233.09
-1.91%
XRP(XRP)
€3.05
-1.51%
Tether(USDT)
€0.97
-0.01%
Solana(SOL)
€239.83
-9.96%
Dogecoin(DOGE)
€0.350600
-8.14%
USDC(USDC)
€0.97
0.00%
Shiba Inu(SHIB)
€0.000020
-4.59%
Pepe(PEPE)
€0.000016
-8.51%
Peanut the Squirrel(PNUT)
€0.373730
-22.62%
Scroll to Top