Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CrowdStrike Outage Exploited: CERT-In Warns of Phishing Attacks

    CrowdStrike Outage Exploited: CERT-In Warns of Phishing Attacks

    July 27, 2024

    The Indian Computer Emergency Response Team (CERT-In) has issued a warning about an ongoing phishing campaign that is exploiting a recent outage event involving CrowdStrike’s Falcon Sensor software.

    On July 19, 2024, a faulty update to the CrowdStrike Falcon Sensor led to widespread crashes of Microsoft Windows operating systems. Both CrowdStrike and Microsoft have since released official fixes, but cybercriminals are leveraging this incident to target CrowdStrike users.

    Details of the Phishing Campaign

    The phishing campaign reported by CERT-In involves several malicious activities aimed at exploiting the CrowdStrike issue:

    Phishing Emails: Attackers are sending emails posing as CrowdStrike support to trick customers into providing sensitive information or downloading malware.
    Impersonating CrowdStrike Staff: Fraudsters are making phone calls impersonating CrowdStrike employees to gain the trust of their targets.
    Selling Fake Recovery Scripts: Cybercriminals are selling software scripts that falsely claim to automate recovery from the CrowdStrike update issue.
    Distributing Trojan Malware: Malicious actors are distributing Trojan malware disguised as recovery tools.

    These phishing attacks can result in the installation of malware, leading to data leakage, system crashes, and data loss.

    CERT-In’s Recommendations

    To protect against these phishing attacks, CERT-In advises organizations and individuals to follow best practices and remediation methods:

    Apply Official Fixes: Ensure you apply the remediation methods provided by CrowdStrike and Microsoft. The official CrowdStrike guidance can be found here, and the Microsoft patch update is available here.
    Verify Email and Phone Communications: Do not trust unsolicited emails or phone calls claiming to be from CrowdStrike. Always verify the source before taking any action.
    Avoid Untrusted Websites: Do not browse untrusted websites or follow links from unsolicited emails and SMS messages. Be cautious with attachments, especially those with “.exe” extensions, as they are likely to be malicious.
    Limit Download Sources: Only download software from official and trusted websites to reduce the risk of malware infection.
    Inspect Phone Numbers: Look out for suspicious phone numbers that do not resemble real mobile phone numbers. Scammers often use email-to-text services to mask their identity.
    Research Before Clicking Links: Perform extensive research before clicking on any links provided in messages. Use search engines to verify the legitimacy of the organization’s website.
    Use Safe Browsing Tools: Implement safe browsing tools, antivirus software, and content-based filtering in your firewall and filtering services to protect against malicious websites.
    Caution with Shortened URLs: Be wary of shortened URLs (e.g., bit.ly, tinyurl). Hover over these URLs to see the full website domain or use URL checkers to preview the full URL before clicking.
    Check for Encryption Certificates: Look for valid encryption certificates by checking for the green lock in the browser’s address bar before entering any sensitive information.

    Background on the CrowdStrike Outage

    On July 19, 2024, a global outage affected Microsoft Windows systems equipped with the CrowdStrike Falcon Sensor. The issue arose from a faulty update to the agent, causing systems to experience crashes and the notorious Blue Screen of Death (BSOD). This critical error indicates a system halt due to hardware or software failure, rendering affected devices inoperable.

    CERT-In issued a critical advisory (CIAD-2024-0035) to address the issue, urging organizations to apply the official fixes from CrowdStrike and Microsoft to mitigate the impact of the outage. Despite the availability of these fixes, cybercriminals have seized the opportunity to launch phishing campaigns, further complicating the situation for affected users.

    Conclusion

    CERT-In’s advisory serves as a crucial reminder for organizations and individuals to adhere to best practices, apply official patches, and remain cautious of unsolicited communications. By following these guidelines, users can mitigate the risks associated with this phishing campaign and protect their systems and sensitive data from malicious actors.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleIIT Kanpur, NPTI Join Forces to Secure India’s Power Grid
    Next Article FBCS Data Breach: Number of Affected Individuals Surges to 4.2 Million

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-40906 – MongoDB BSON Serialization BSON::XS Multiple Vulnerabilities

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Instead of AirPods, I’d recommend Meta Ray-Bans as the best tech deal of Black Friday 2024

    Development

    Increase the test performance avoiding the use of mock.create_autospec()

    Development

    CVE-2025-4818 – SourceCodester Doctor’s Appointment System SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-29690 – OA System Cross-Site Scripting (XSS)

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Machine Learning

    Understanding AI Agent Memory: Building Blocks for Intelligent Systems

    March 30, 2025

    AI agent memory comprises multiple layers, each serving a distinct role in shaping the agent’s…

    F Society Targets Rutgers University, Bitfinex in Latest Cyberattack

    May 3, 2024

    CVE-2025-47736 – SQLite3 Parser Invalid UTF-8 Input Crash

    May 9, 2025

    Can Appium be used for web testing on a Mac with PyCharm?

    August 5, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.