www.reliaquest.com
Open in
urlscan Pro
141.193.213.20
Public Scan
Submitted URL: https://email.reliaquest.com/NDM4LUtZSy03ODYAAAGUo5MT2CxPYlJYXkkJ9iRn2ssI_5Bm19eKy0iR_r-OgkyghhgwWi_YiDI54QEwQjq2TnAgX9A=
Effective URL: https://www.reliaquest.com/blog/crowdstrike-outage-script-phishing-and-social-engineering-attacks/?utm_source=marketo&utm_m...
Submission Tags: urlscan
Submission: On July 30 via api from US — Scanned from US
Effective URL: https://www.reliaquest.com/blog/crowdstrike-outage-script-phishing-and-social-engineering-attacks/?utm_source=marketo&utm_m...
Submission Tags: urlscan
Submission: On July 30 via api from US — Scanned from US
Form analysis
2 forms found in the DOMGET https://www.reliaquest.com/
<form id="searchwp-form-1" role="search" method="get" class="searchwp-form" action="https://www.reliaquest.com/">
<input type="hidden" name="swp_form[form_id]" value="1">
<div class="swp-flex--col swp-flex--wrap swp-flex--gap-md">
<div class="swp-flex--row swp-items-stretch swp-flex--gap-md">
<div class="searchwp-form-input-container swp-items-stretch">
<input type="search" class="swp-input--search swp-input" placeholder="" value="" name="s" title="" data-swplive="true" autocomplete="off" aria-owns="searchwp_live_search_results_66a9325f285ac" aria-autocomplete="both"
aria-label="When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.">
</div>
</div>
</div>
</form>
GET https://www.reliaquest.com
<form action="https://www.reliaquest.com" method="get" class="form-mobile">
<div class="form-group">
<div class="input-group d-flex position-relative">
<span class="input-group-text position-absolute"><i class="icon-search"></i></span>
<button class="btn btn-outline-secondary position-absolute" type="reset" id="button-addon1"><i class="icon-close"></i></button>
<input class="form-control" type="text" name="s" placeholder="Search here.." value="" aria-label="default input example">
</div>
</div>
<button type="submit" class="btn btn-primary w-100">Search</button>
</form>
Text Content
Skip to Content Javascript must be enabled for the correct page display Webinar | Team Burned Out on Phishing Analysis? Here's How to Help. Register Now * Solutions Go Back Make Security Possible Reduce Alert Noise and False Positives Boost your team's productivity by cutting down alert noise and false positives. Automate Security Operations Boost efficiency, reduce burnout, and better manage risk through automation. Dark Web Monitoring Online protection tuned to the need of your business. Maximize Existing Security Investments Improve efficiencies from existing investments in security tools. Beyond MDR Move your security operations beyond the limitations of MDR. Secure with Microsoft 365 E5 Boost the power of Microsoft 365 E5 security. Secure Multi-Cloud Environments Improve cloud security and overcome complexity across multi-cloud environments. Secure Mergers and Acquisitions Control cyber risk for business acquisitions and dispersed business units. Operational Technology Solve security operations challenges affecting critical operational technology (OT) infrastructure. Force-Multiply Your Security Operations Whether you’re just starting your security journey, need to up your game, or you’re not happy with an existing service, we can help you to achieve your security goals. Explore Our Solutions * Platform Go Back The GreyMatter Platform Detection Investigation Response Modernize Detection, Investigation, Response with a Security Operations Platform. Threat Hunting Locate and eliminate lurking threats with ReliaQuest GreyMatter Threat Intelligence Find cyber threats that have evaded your defenses. Model Index Security metrics to manage and improve security operations. Breach and Attack Simulation GreyMatter Verify is ReliaQuest’s automated breach and attack simulation capability. Digital Risk Protection Continuous monitoring of open, deep, and dark web sources to identify threats. Phishing Analyzer GreyMatter Phishing Analyzer removes the abuse mailbox management by automating the DIR process for you. Integration Partners The GreyMatter cloud-native Open XDR platform integrates with a fast-growing number of market-leading technologies. Unify and Optimize Your Security Operations ReliaQuest GreyMatter is a security operations platform built on an open XDR architecture and designed to help security teams increase visibility, reduce complexity, and manage risk across their security tools, including on-premises, clouds, networks, and endpoints. Explore the GreyMatter Platform * Resources Go Back Resources Blog Company Blog Case Studies Brands of the world trust ReliaQuest to achieve their security goals. Data Sheets Learn how to achieve your security outcomes faster with ReliaQuest GreyMatter. eBooks The latest security trends and perspectives to help inform your security operations. Industry Guides and Reports The latest security research and industry reports. Podcasts Catch up on the latest cybersecurity podcasts, and mindset moments from our very own mental performance coaches. Solution Briefs A deep dive on how ReliaQuest GreyMatter addresses security challenges. White Papers The latest white papers focused on security operations strategy, technology & insight. Videos Current and future SOC trends presented by our security experts. Events & Webinars Explore all upcoming company events, in-person and on-demand webinars ReliaQuest Resource Center From prevention techniques to emerging security trends, our comprehensive library can arm you with the tools you need to improve your security posture. Resource Center * Research Go Back Threat Research Threat Research Get the latest threat analysis from the ReliaQuest Threat Research Team. ReliaQuest ShadowTalk Weekly podcast featuring discussions on the latest cybersecurity news and threat research. Shadow Talk ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. Featured Research Introducing: Finance & Insurance Sector Threat Landscape July 25, 2024 * Company Go Back Company About ReliaQuest We bring our best attitude, energy and effort to everything we do, every day, to make security possible. Leadership Security is a team sport. No Show Dogs Podcast Mental Performance Coaches Derin McMains and Dr. Nicole Detling interview world-class performers across multiple industries. Make It Possible Make It Possible reflects our focus on bringing cybersecurity awareness to our communities and enabling the next generation of cybersecurity professionals. Careers Join our world-class team. Press and Media Coverage ReliaQuest newsroom covering the latest press release and media coverage. Become a Channel Partner When you partner with ReliaQuest, you help deliver world-class cybersecurity solutions. Contact Us How can we help you? A Mindset Like No Other in the Industry Many companies tout their cultures; at ReliaQuest, we share a mindset. We focus on four values every day to make security possible: being accountable, helpful, adaptable, and focused. These values drive development of our platform, relationships with our customers and partners, and further the ReliaQuest promise of security confidence across our customers and our own teams. * Search Go Back Search Request a Demo Back to blog CROWDSTRIKE OUTAGE: SCRIPT, PHISHING, AND SOCIAL ENGINEERING ATTACKS ReliaQuest Threat Research Team 19 July 2024 * Emerging Threats * Threat Research TABLE OF CONTENTS 1. Latest Updates 2. Initial Coverage 3. Potential Attack: Fake Scripts 4. Potential Attack: Phishing 5. Potential Attack: Social Engineering 6. Threat Forecast 7. What ReliaQuest Is Doing 8. Official Mitigation from CrowdStrike Key Points * On July 19, 2024, a CrowdStrike update caused millions of Windows users globally to experience the blue screen of death (BSOD), leading to system shutdowns. CrowdStrike has identified and fixed the issue. * ReliaQuest warns of fake PowerShell and Batch scripts posing as fixes, likely to appear on platforms like GitHub. These scripts can install dangerous software like Cobalt Strike, enabling unauthorized access. * A surge in new domains claiming to offer fixes has been detected. These domains may be used for phishing or malware distribution. Users must verify the authenticity of any site or email before taking action. * The confusion from the outage creates opportunities for social engineering attacks. Cybercriminals may impersonate IT personnel or cybersecurity firms, tricking users into revealing sensitive information or downloading malware. * July 22 update: Attackers are distributing malware disguised as a CrowdStrike fix or via Microsoft Word docs that contain harmful macro code. * July 22 update: Microsoft has introduced an updated recovery tool that offers two repair options to help IT administrators speed up the repair process. Updated July 22 ATTACKERS DISTRIBUTE MALICIOUS RECOVERY FILES On July 22, ReliaQuest identified threat actors distributing malware masquerading as a fix for the Crowdstrike Blue Screen of Death (BSOD) error. In one instance, attackers are sending phishing emails with a ZIP file named “crowdstrike-hotfix.zip,” which deploys malware known as “Remcos RAT.” IOCS: * fef212ec979f2fe2f48641160aadeb86b83f7b35 * 66fbe2b33e545062a1399a4962b9af4fbbd4b356 * 5b2f56953b3c925693386cae5974251479f03928 * 4491901eff338ab52c85a77a3fbd3ce80fda738046ee3b7da7be468da5b331a3 * 19001dd441e50233d7f0addb4fcd405a70ac3d5e310ff20b331d6f1a29c634f0 * 213[.]5[.]130[.]58 Additionally, attackers have been observed distributing malicious Microsoft Word documents containing harmful macro code. When these macros are enabled and executed, they download information-stealing malware. IOCS: * 803727ccdf441e49096f3fd48107a5fe55c56c080f46773cd649c9e55ec1be61 * 4ad9845e691dd415420e0c253ba452772495c0b971f48294b54631e79a22644a * 172[.]104[.]160[.]126 MICROSOFT RELEASES RECOVERY TOOL Following the issue with the CrowdStrike Falcon agent affecting Windows clients and servers, Microsoft has introduced an updated recovery tool that offers two repair options to help IT administrators speed up the repair process. * Recover from WinPE: This option creates boot media to aid in repairing the device. * Recover from Safe Mode: This option generates boot media allowing impacted devices to boot into safe mode. Users can then log in with an account that has local admin privileges and follow the remediation steps. Microsoft includes detailed instructions found here. Initial Coverage, July 19 On July 19, 2024, a critical issue stemming from a CrowdStrike update resulted in millions of Windows users globally experiencing the blue screen of death (BSOD) error, causing their systems to shut down or restart. CrowdStrike has acknowledged the problem, attributing it to updates made to its Falcon Sensor. CrowdStrike has provided workaround steps for impacted users and stated that the issue has been identified and isolated and a fix deployed. They have assured users that Linux and Mac hosts remain unaffected and confirmed that this incident is not the result of a cyber attack. Users on cybercriminal forums were quick to begin discussing the issue. For instance, a user with the moniker “ART 46,” who purported to represent a new hacking group, claimed responsibility for the incident. This claim was widely dismissed by forum users and moderators, who demanded evidence for the allegation. Due to the lack of proof, the user was subsequently banned by the forum moderator and the claim dismissed (see Figure 1). At the time of writing, there is no indication of threat actor involvement in the incident, but there is clear evidence that cybercriminals are aware of the situation. As businesses around the world respond to events related to CrowdStrike outages, threat actors are exploiting the ensuing chaos to prey on organizations at their weakest. This Spotlight details areas that may be abused by threat actors, helping organizations to shore up their defenses and remain vigilant against potential threats. Figure 1: Forum moderator dismisses cybercriminal involvement in CrowdStrike outage POTENTIAL CYBERCRIMINAL ACTIVITY FAKE SCRIPTS Threat actors are poised to prey on users desperately seeking solutions to the CrowdStrike update issue by crafting malicious scripts masquerading as genuine fixes. ReliaQuest warns that, in the immediate future, these malicious PowerShell and Batch scripts will likely proliferate on popular code-sharing platforms like GitHub. Once executed, these scripts can infect systems and install additional dangerous software such as Cobalt Strike or remote monitoring and management (RMM) tools, paving the way for unauthorized access and control. The urgency to resolve the update problem makes users particularly vulnerable to these sophisticated traps. Stay vigilant and verify the authenticity of any script before execution to protect your systems from further harm. Recommendations to Combat This Threat * Only follow official vendor recommendations to remediate the update issue. * Verify the source of any scripts created to automate the remediation process. * Advise users not to download any software that advertises itself as a USB solution to restore impacted machines. Threat actors may promote fake fixes that, when downloaded, infect the initial system. PHISHING DOMAINS ReliaQuest has detected a surge in new impersonating domains following the CrowdStrike outage, many of which claim to offer fixes and helpful information. Users should exercise caution; cybercriminals are highly adept at creating impersonating domains to distribute malware or execute phishing attacks. Even seemingly legitimate domains can be weaponized to send phishing emails that lure victims into downloading malicious software or divulging sensitive information, such as credentials or payment card details. America’s Cybersecurity and Infrastructure Security Agency (CISA) and the UK’s National Cyber Security Centre (NCSC) have already reported an uptick in phishing campaigns exploiting this outage. Threat actors are seizing this opportunity to deceive and compromise unsuspecting users. It is important to stay vigilant and verify the authenticity of any site or email before taking action. Below are several domains we observed being created today that have the potential to be used for phishing campaigns or scams. crowdstrike[.]fail crowdstrikeoopsie[.]com crowdstrike-bsod[.]com crowdstrikefix[.]zip crowdstrikebug[.]com crowdstrikedown[.]site crowdstrikebluescreen[.]com crowdstrikeoutage[.]info crowdstrikedoomsday[.]com crowdstriketoken[.]com crowdstrikeoutage[.]com crowdstrikeupdate[.]com isitcrowdstrike[.]com crowdstrikebsod[.]com fix-crowdstrike-bsod[.]com crowdstrike-helpdesk[.]com crowdstrike0day[.]com crowdstrikeclaim[.]com crowdstrikedown[.]com crowdstrikefail[.]com crowdstrikefix[.]com crowdstrikereport[.]com fix-crowdstrike-apocalypse[.]com microsoftcrowdstrike[.]com iscrowdstrikedown[.]com suportecrowdstrike[.]com whatiscrowdstrike[.]com Recommendations to Combat This Threat * Be cautious of links posted on social media unless they come from an official or trusted source. * Report suspicious emails and do not click on links received from unsolicited emails regarding the outage. * Visit the vendor’s legitimate website for recommendations and consult reliable IT or security providers for additional support. SOCIAL ENGINEERING This incident has plunged millions of users into chaos and confusion, creating a prime opportunity for cybercriminals to strike. Amid this turmoil, threat actors will exploit the situation for financial gain or to breach security defenses. History has shown that adversaries often leverage current events—be it tax season or significant cyber attacks—to deceive unsuspecting victims. With the widespread disruption caused by the update, it is highly likely that attackers will target affected companies with social engineering attacks. Using tools like Down Detector, cybercriminals can easily identify impacted organizations and launch sophisticated phishing or vishing (voice phishing) campaigns. These malicious actors may impersonate IT personnel from the affected company or even representatives from cybersecurity firms like CrowdStrike, promising to fix the issue or provide preventative measures. In such scenarios, users might unwittingly divulge sensitive information, visit malicious websites, or download unauthorized applications, potentially leading to compromised credentials or granting remote access to attackers. The sense of urgency and desire for resolution makes users especially susceptible, making it crucial for everyone to remain vigilant and skeptical of unsolicited offers of help. Recommendations to Combat This Threat * Educate users to be extra cautious about potential phishing emails, suspicious phone calls, or unusual user behaviors. * Implement certificate-based authentication policies and use digital certificates to verify user authenticity during the login process. * Incorporate alternative authentication methods, such as biometrics and adaptive authentication, to enhance security. THREAT FORECAST In the coming days and weeks, financially motivated threat actors will exploit the confusion and concern caused by the CrowdStrike outage to launch targeted attacks on individuals and organizations. These adversaries may exploit the situation by crafting malicious scripts disguised as legitimate fixes, ready to infect systems with harmful software. They might also conduct phishing campaigns to trick users into downloading malware and compromising their credentials. Furthermore, they may execute social engineering attacks, posing as IT personnel to deceive and manipulate victims. We have just explored three options here, but there are many other ways in which attackers may take advantage of the situation. Organizations must recognize this heightened threat and strictly adhere to official remediation advice to safeguard against these opportunistic exploits. WHAT RELIAQUEST IS DOING To help organizations mitigate the risk, ReliaQuest is actively watching out for impersonating domains, as well as additional dark web communications discussing attacks or developing threats. We will continue to monitor the situation and release new updates as they become available. OFFICIAL REMEDIATION ADVICE Currently, no global remediation is available to mass deploy the recommended script. Each host will need manual remediation, increasing remediation times to weeks instead of days or hours. CrowdStrike customers will need to forcibly shut down and reboot their systems to download the reverted update file. If the system continues to crash, the following work around steps are recommended. * Boot Windows into Safe Mode or the Windows Recovery Environment * Navigate to the C:\Windows\System32\drivers\CrowdStrike directory * Locate the file matching “C-00000291*.sys” and delete it * Boot the host normally It is important to note that hosts using BitLocker encryption may require recovery keys. Additional information from CrowdStrike on remediation can be found here. TABLE OF CONTENTS 1. Latest Updates 2. Initial Coverage 3. Potential Attack: Fake Scripts 4. Potential Attack: Phishing 5. Potential Attack: Social Engineering 6. Threat Forecast 7. What ReliaQuest Is Doing 8. Official Mitigation from CrowdStrike ReliaQuest Threat Research Team The ReliaQuest Threat Research Team comprises SOC experts, security researchers, security practitioners, and intelligence analysts dedicated to bringing you the latest global analysis and essential updates within cyberthreat intelligence for your organization. Explore Blogs TABLE OF CONTENTS 1. Latest Updates 2. Initial Coverage 3. Potential Attack: Fake Scripts 4. Potential Attack: Phishing 5. Potential Attack: Social Engineering 6. Threat Forecast 7. What ReliaQuest Is Doing 8. Official Mitigation from CrowdStrike ReliaQuest Threat Research Team The ReliaQuest Threat Research Team comprises SOC experts, security researchers, security practitioners, and intelligence analysts dedicated to bringing you the latest global analysis and essential updates within cyberthreat intelligence for your organization. Explore Blogs Resources RELATED BLOGS Threat Intelligence | Threat Research INTRODUCING: FINANCE & INSURANCE SECTOR THREAT LANDSCAPE 4 Mins Learn More Threat Intelligence | Threat Research RANSOMWARE AND CYBER EXTORTION IN Q2 2024 17 Mins Learn More Threat Intelligence | Threat Research INTRODUCING “AI-POWERED CYBERCRIME” REPORT 4 Mins Learn More All Blogs SEE GREYMATTER IN ACTION Get a live demo of our security operations platform, GreyMatter, and learn how you can improve visibility, reduce complexity, and manage risk in your organization. Request a Demo Contact ReliaQuest Sales (800) 925-2159 Global Corporate Headquarters 1001 Water St Suite 1900 Tampa, FL 33602 * * * * * Solutions * Solution Overview * Reduce Noise and False Positives * Maximize Security Investments * Automate Security Operations * Beyond MDR * Secure with Microsoft E5 * Secure Multi-Cloud Environments * Secure Mergers and Acquisitions * Operational Technology Security Operations Platform * GreyMatter Overview * Detection, Investigation, and Response Automation * Model Index * Threat Hunting * Breach and Attack Simulation * Threat Intelligence * Digital Risk Protection * Phishing Analyzer * Integration Partners Company * About ReliaQuest * Digital Shadows Acquisition * Leadership * Company Blog * Events * Press and Media * Careers * Become a Partner * Contact ReliaQuest * Request a Demo * Vulnerability Disclosure Program * Privacy Policy * ReliaQuest Platform and Support Agreement * © 2024 ReliaQuest, LLC All Rights Reserved ✓ Thanks for sharing! AddToAny More… word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1