Company Details
crowdstrike
10,400
955,946
541514
crowdstrike.com
604
CRO_1661713
Completed

CrowdStrike Company CyberSecurity Posture
crowdstrike.comCrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities. Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value. CrowdStrike: We stop breaches.
Company Details
crowdstrike
10,400
955,946
541514
crowdstrike.com
604
CRO_1661713
Completed
Between 700 and 749

CrowdStrike Global Score (TPRM)XXXX

Description: CrowdStrike confirmed that internal screenshots were leaked by a terminated employee to the **Scattered Lapsus$ Hunters** cybercrime collective and published on Telegram. The incident involved an insider allegedly paid **$25,000** by **ShinyHunters** for access, including SSO authentication cookies. However, CrowdStrike detected the unauthorized activity and revoked the insider’s access before any critical systems or customer data were compromised. The company stated that **no breach of its systems occurred**, and **no customer data was exposed**.The leak was part of a broader extortion campaign by **Scattered Lapsus$ Hunters**, a collective linked to high-profile breaches at companies like **Google, Cisco, and Jaguar Land Rover** (which suffered **$220M in damages**). The group has also targeted **Salesforce, FedEx, Disney, and Marriott** through voice-phishing and ransomware-as-a-service (RaaS) platforms like **ShinySp1d3r**. While the incident involved insider-driven data exposure, CrowdStrike maintained that its core security infrastructure remained intact, and law enforcement was engaged for further investigation.
Description: On January 7, 2025, CrowdStrike fell victim to a sophisticated phishing campaign that abused its recruitment branding, leading potential job applicants to inadvertently install a cryptominer, specifically the XMRig. The attackers crafted convincing phishing emails, promising the prospects a junior developer position and directing them to a fraudulent website. This site offered a fake 'employee CRM application,' which was, in reality, malware in the guise of a Windows executable. The attackers included evasion techniques to avoid detection, and upon passing these checks, the malware proceeded to use the victim's resources to mine cryptocurrency. This not only misused the company's resources but also possibly damaged its reputation among potential job applicants.
Description: A defective update to the CrowdStrike Falcon platform led to worldwide service outages, crashing Windows PCs and servers. This affected various critical sectors including air travel, hospitals, banks, and educational institutions, causing widespread operational disruptions and service unavailability.
Description: CrowdStrike experienced a phishing campaign misusing its recruitment brand to distribute a fraudulent 'employee CRM application' which, when downloaded and executed, installs the XMRig cryptominer. Attackers lured job seekers with fake junior developer positions, directing them to a deceptive site where they could download the malware under the guise of necessary software for a recruitment call. The Rust-written Windows executable had evasion tactics to circumvent security analysis and would initiate mining activities upon successful deceit. This campaign not only abused CrowdStrike's brand for distributing malware but also targeted individuals seeking employment.
Description: CrowdStrike faced significant disruption after releasing a flawed software update to its Falcon platform, which caused Windows computers to malfunction. The issue caused widespread operational delays and opened the door for opportunistic cybercriminals to launch 'CrowdStrike Support' scams. These threat actors targeted the company's customers and others affected, creating websites and sending phishing emails masquerading as support staff, exacerbating the initial damage and misleading victims during a vulnerable time.
Description: CrowdStrike, a leader in cloud-delivered endpoint protection, faced a sophisticated cyber attack aiming to compromise its sensitive data and internal systems. The attack showcased the evolving tactics, techniques, and procedures (TTPs) of adversaries targeting cybersecurity firms. The attackers attempted to exploit vulnerabilities and deploy malware to access customer information and proprietary data. Through rapid detection and response, CrowdStrike was able to mitigate the attack, minimizing the impact on its operations and customer data. This incident underscores the continuous threats faced by cybersecurity providers and the importance of adopting a comprehensive cybersecurity strategy that includes real-time threat intelligence, advanced monitoring, and the implementation of a Zero Trust architecture to reduce the risk of such attacks.
Description: A **supply chain attack** (dubbed *Shai-Halud*) compromised multiple **npm packages** maintained under CrowdStrike’s official publisher account. Threat actors injected a malicious `bundle.js` script into packages like `@crowdstrike/commitlint`, `@crowdstrike/falcon-shoelace`, and others, which executed covertly upon installation. The payload deployed **TruffleHog**—a legitimate secret-scanning tool—to harvest **developer credentials, API keys, cloud tokens, and CI/CD secrets** from infected systems. Exfiltrated data was sent to a hardcoded attacker-controlled webhook (`hxxps://webhook[.]site/bb8ca5f6-4175-45d2-b042-fc9ebb8170b7`). The attack also **created unauthorized GitHub Actions workflows** in victim repositories, risking further compromise. While CrowdStrike removed the malicious versions and rotated keys, the breach exposed **internal development environments, CI/CD pipelines, and potentially proprietary code or customer-integrated systems**. The incident mirrors prior attacks on libraries like `tinycolor`, highlighting systemic risks in open-source supply chains. Organizations using these packages were urged to **uninstall affected versions, rotate all exposed secrets, and audit systems** for unauthorized modifications. CrowdStrike confirmed the **Falcon sensor platform remained unaffected**, but the attack undermined trust in their open-source tooling and posed **operational, reputational, and security risks** for dependent enterprises.
Description: Security researchers at SEC Consult uncovered a vulnerability in CrowdStrike's Falcon Sensor, named 'Sleeping Beauty,' that let attackers bypass detection mechanisms and execute malicious applications. Attackers could suspend EDR processes to evade detection once they obtained SYSTEM permissions on Windows, using Process Explorer to suspend Falcon processes. Though CrowdStrike initially did not consider it a security vulnerability, the issue allowed the execution of typically blocked malicious tools. Eventually, CrowdStrike corrected the flaw by preventing process suspension, acknowledging the oversight after researchers discovered the change.
Description: The global crash was triggered by a kernel driver update in CrowdStrike's Falcon software, causing system outages worldwide. Healthcare services were impeded, delaying patient communications and appointments. Emergency services, including 911, suffered from disrupted lines. TV stations like Sky News in the UK temporarily ceased live broadcasts. The issue demanded manual device recovery, which included system reboots, impacting businesses and public bodies. The scale of the event marked a significant setback in operational continuity, service provision, and public trust.


CrowdStrike has 986.96% more incidents than the average of same-industry companies with at least one recorded incident.
CrowdStrike has 681.25% more incidents than the average of all companies with at least one recorded incident.
CrowdStrike reported 5 incidents this year: 2 cyber attacks, 0 ransomware, 1 vulnerabilities, 2 data breaches, compared to industry peers with at least 1 incident.
CrowdStrike cyber incidents detection timeline including parent company and subsidiaries

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities. Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value. CrowdStrike: We stop breaches.

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s
.png)
2025 is proving to be a defining year for cybersecurity, with the rise of artificial intelligence that can both defend and attack computer...
In its 2025 European Threat Landscape report, CrowdStrike has revealed some alarming trends in cyber-attacks, placing Europe as the second-most targeted...
F5 and CrowdStrike announced a new alliance that embeds the CrowdStrike Falcon Sensor directly into F5's BIG-IP family of network operations...
AUSTIN, Texas, November 17, 2025--CrowdStrike (NASDAQ: CRWD) today announced it has been named to Fortune World's Best Workplaces™ in 2025...
CrowdStrike, Palo Alto Networks, Fortinet, Globant, SentinelOne, BlackBerry, and Arqit Quantum are the seven Cybersecurity stocks to watch...
In recent weeks, CrowdStrike announced several significant developments, including its selection as an inaugural partner in the Google...
CrowdStrike, Palo Alto Networks, Fortinet, Globant, and SentinelOne are the five Cybersecurity stocks to watch today, according to...
CrowdStrike, Palo Alto Networks, Fortinet, Globant, and SentinelOne are the five Cybersecurity stocks to watch today, according to...
Anthropic reveals the first AI-orchestrated cyberattack using Claude, sending shockwaves through cybersecurity stocks and reshaping defense...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of CrowdStrike is http://www.crowdstrike.com.
According to Rankiteo, CrowdStrike’s AI-generated cybersecurity score is 709, reflecting their Moderate security posture.
According to Rankiteo, CrowdStrike currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, CrowdStrike is not certified under SOC 2 Type 1.
According to Rankiteo, CrowdStrike does not hold a SOC 2 Type 2 certification.
According to Rankiteo, CrowdStrike is not listed as GDPR compliant.
According to Rankiteo, CrowdStrike does not currently maintain PCI DSS compliance.
According to Rankiteo, CrowdStrike is not compliant with HIPAA regulations.
According to Rankiteo,CrowdStrike is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
CrowdStrike operates primarily in the Computer and Network Security industry.
CrowdStrike employs approximately 10,400 people worldwide.
CrowdStrike presently has no subsidiaries across any sectors.
CrowdStrike’s official LinkedIn profile has approximately 955,946 followers.
CrowdStrike is classified under the NAICS code 541514, which corresponds to Others.
No, CrowdStrike does not have a profile on Crunchbase.
Yes, CrowdStrike maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/crowdstrike.
As of November 27, 2025, Rankiteo reports that CrowdStrike has experienced 9 cybersecurity incidents.
CrowdStrike has an estimated 2,775 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability, Breach and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an enhanced monitoring with real-time threat intelligence, enhanced monitoring with advanced monitoring, and remediation measures with manual device recovery, system reboots, and remediation measures with preventing process suspension, and and third party assistance with npm registry collaboration, and containment measures with removal of malicious packages from npm registry, containment measures with key rotation in public registries, and remediation measures with audit of environments/developer machines, remediation measures with credential rotation (npm tokens, cloud credentials), remediation measures with monitoring for unauthorized publishes, and recovery measures with pinning to known-good package versions, recovery measures with awaiting patched releases, and communication strategy with public statement via gbhackers on security, communication strategy with collaboration with npm for technical analysis, and enhanced monitoring with logs for unusual npm/github activity, and and and containment measures with termination of insider access, containment measures with revocation of compromised credentials, and communication strategy with public statement, communication strategy with media engagement..
Title: Sophisticated Cyber Attack on CrowdStrike
Description: CrowdStrike, a leader in cloud-delivered endpoint protection, faced a sophisticated cyber attack aiming to compromise its sensitive data and internal systems. The attack showcased the evolving tactics, techniques, and procedures (TTPs) of adversaries targeting cybersecurity firms. The attackers attempted to exploit vulnerabilities and deploy malware to access customer information and proprietary data. Through rapid detection and response, CrowdStrike was able to mitigate the attack, minimizing the impact on its operations and customer data. This incident underscores the continuous threats faced by cybersecurity providers and the importance of adopting a comprehensive cybersecurity strategy that includes real-time threat intelligence, advanced monitoring, and the implementation of a Zero Trust architecture to reduce the risk of such attacks.
Type: Cyber Attack
Attack Vector: Malware, Vulnerability Exploitation
Motivation: Data Theft, Access to Proprietary Data
Title: CrowdStrike Falcon Platform Software Update Disruption
Description: CrowdStrike faced significant disruption after releasing a flawed software update to its Falcon platform, which caused Windows computers to malfunction. The issue caused widespread operational delays and opened the door for opportunistic cybercriminals to launch 'CrowdStrike Support' scams. These threat actors targeted the company's customers and others affected, creating websites and sending phishing emails masquerading as support staff, exacerbating the initial damage and misleading victims during a vulnerable time.
Type: Software Update Issue and Phishing Campaign
Attack Vector: PhishingMalicious Websites
Vulnerability Exploited: Flawed Software Update
Threat Actor: Opportunistic Cybercriminals
Motivation: ScamPhishing
Title: Global Crash Triggered by CrowdStrike Falcon Software Update
Description: The global crash was triggered by a kernel driver update in CrowdStrike's Falcon software, causing system outages worldwide. Healthcare services were impeded, delaying patient communications and appointments. Emergency services, including 911, suffered from disrupted lines. TV stations like Sky News in the UK temporarily ceased live broadcasts. The issue demanded manual device recovery, which included system reboots, impacting businesses and public bodies. The scale of the event marked a significant setback in operational continuity, service provision, and public trust.
Type: Software Malfunction
Vulnerability Exploited: Kernel driver update
Title: CrowdStrike Falcon Platform Outage
Description: A defective update to the CrowdStrike Falcon platform led to worldwide service outages, crashing Windows PCs and servers. This affected various critical sectors including air travel, hospitals, banks, and educational institutions, causing widespread operational disruptions and service unavailability.
Type: Service Outage
Title: Phishing Campaign Targeting CrowdStrike Job Applicants
Description: On January 7, 2025, CrowdStrike fell victim to a sophisticated phishing campaign that abused its recruitment branding, leading potential job applicants to inadvertently install a cryptominer, specifically the XMRig. The attackers crafted convincing phishing emails, promising the prospects a junior developer position and directing them to a fraudulent website. This site offered a fake 'employee CRM application,' which was, in reality, malware in the guise of a Windows executable. The attackers included evasion techniques to avoid detection, and upon passing these checks, the malware proceeded to use the victim's resources to mine cryptocurrency. This not only misused the company's resources but also possibly damaged its reputation among potential job applicants.
Date Detected: 2025-01-07
Type: Phishing
Attack Vector: Phishing Email
Motivation: Financial Gain
Title: Phishing Campaign Targeting Job Seekers
Description: CrowdStrike experienced a phishing campaign misusing its recruitment brand to distribute a fraudulent 'employee CRM application' which, when downloaded and executed, installs the XMRig cryptominer. Attackers lured job seekers with fake junior developer positions, directing them to a deceptive site where they could download the malware under the guise of necessary software for a recruitment call. The Rust-written Windows executable had evasion tactics to circumvent security analysis and would initiate mining activities upon successful deceit. This campaign not only abused CrowdStrike's brand for distributing malware but also targeted individuals seeking employment.
Type: Phishing
Attack Vector: Fake job postings and malicious downloads
Motivation: Cryptomining
Title: Sleeping Beauty Vulnerability in CrowdStrike's Falcon Sensor
Description: Security researchers at SEC Consult uncovered a vulnerability in CrowdStrike's Falcon Sensor, named 'Sleeping Beauty,' that let attackers bypass detection mechanisms and execute malicious applications. Attackers could suspend EDR processes to evade detection once they obtained SYSTEM permissions on Windows, using Process Explorer to suspend Falcon processes. Though CrowdStrike initially did not consider it a security vulnerability, the issue allowed the execution of typically blocked malicious tools. Eventually, CrowdStrike corrected the flaw by preventing process suspension, acknowledging the oversight after researchers discovered the change.
Type: Vulnerability Exploitation
Attack Vector: Process Suspension
Vulnerability Exploited: Sleeping Beauty
Motivation: Bypass Detection Mechanisms
Title: Supply Chain Attack on CrowdStrike npm Packages (Shai-Halud Attack)
Description: A supply chain attack compromised multiple npm packages maintained by the crowdstrike-publisher account, part of the ongoing 'Shai-Halud attack.' Threat actors injected a malicious `bundle.js` script into these packages, which executes covert tasks post-installation. The payload downloads and runs **TruffleHog**, a legitimate secret-scanning tool, to harvest tokens, API keys, and cloud credentials from host systems. Compromised secrets are then exfiltrated to a hardcoded webhook endpoint (`hxxps://webhook[.]site/bb8ca5f6-4175-45d2-b042-fc9ebb8170b7`). The attack also creates unauthorized GitHub Actions workflows in affected repositories. Affected packages were swiftly removed by the npm registry, but organizations are urged to audit environments, rotate credentials, and monitor for unauthorized activity.
Type: supply chain attack
Attack Vector: compromised npm packagesmalicious dependency injectionpost-install script execution
Vulnerability Exploited: supply chain trust abusenpm package hijackingCI/CD pipeline compromise
Motivation: credential harvestingunauthorized accesspotential follow-on attacks
Title: CrowdStrike Insider Threat Incident Involving Scattered Lapsus$ Hunters
Description: CrowdStrike confirmed that internal screenshots shared by a now-terminated employee were leaked by the Scattered Lapsus$ Hunters cybercrime collective on Telegram. The company stated that no breach of its systems occurred and no customer data was exposed. The insider allegedly sold access to ShinyHunters for $25,000, including SSO authentication cookies, but CrowdStrike detected and terminated the insider’s access before further damage. The incident is linked to broader extortion campaigns by Scattered Lapsus$ Hunters, targeting high-profile companies like Google, Cisco, and Jaguar Land Rover.
Type: Insider Threat
Attack Vector: Insider Threat (Malicious Employee)Social Engineering (Voice-Phishing)Credential Theft (SSO Authentication Cookies)Dark Web/Telegram Leak
Vulnerability Exploited: Human Factor (Insider Access Abuse)
Threat Actor: Scattered Lapsus$ HuntersShinyHuntersScattered Spider
Motivation: Financial GainExtortionReputation DamageData Theft for Resale
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing Email, Fake job postings, compromised npm packages (e.g., @crowdstrike/commitlint, @crowdstrike/falcon-shoelace) and Insider (Terminated Employee).

Data Compromised: Customer Information, Proprietary Data
Systems Affected: Internal Systems

Systems Affected: Windows Computers
Operational Impact: Widespread Operational Delays

Systems Affected: Global systems
Downtime: Significant
Operational Impact: High
Brand Reputation Impact: Significant

Systems Affected: Windows PCsServers
Downtime: Widespread operational disruptions and service unavailability
Operational Impact: Critical sectors affected including air travel, hospitals, banks, and educational institutions

Operational Impact: Misuse of Company Resources
Brand Reputation Impact: Possible Damage

Systems Affected: Job seekers' systems
Brand Reputation Impact: CrowdStrike's brand abuse

Systems Affected: Falcon Sensor

Data Compromised: Developer secrets, Api keys, Cloud credentials, Github tokens
Systems Affected: developer machinesCI/CD pipelinesGitHub repositories
Operational Impact: unauthorized npm publishesmalicious GitHub Actions workflowscredential rotation overhead
Brand Reputation Impact: potential erosion of trust in CrowdStrike's open-source ecosystem
Identity Theft Risk: ['high (due to exposed credentials)']

Data Compromised: Internal screenshots, Sso authentication cookies (attempted)
Operational Impact: Minimal (No System Breach or Customer Data Exposure)
Brand Reputation Impact: Moderate (Public Disclosure of Insider Incident)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Customer Information, Proprietary Data, Secrets, Api Keys, Cloud Credentials, Github Tokens, , Internal Screenshots, Authentication Cookies (Attempted) and .

Entity Name: CrowdStrike
Entity Type: Company
Industry: Cybersecurity

Entity Name: CrowdStrike
Entity Type: Company
Industry: Cybersecurity

Entity Name: CrowdStrike
Entity Type: Software Company
Industry: Cybersecurity
Customers Affected: Global

Entity Name: CrowdStrike
Entity Type: Cybersecurity Company
Industry: Technology
Location: Global
Customers Affected: Air travel, Hospitals, Banks, Educational institutions

Entity Name: CrowdStrike
Entity Type: Company
Industry: Cybersecurity

Entity Name: CrowdStrike
Entity Type: cybersecurity company
Industry: technology/security

Entity Name: Organizations using compromised npm packages
Entity Type: developers, enterprises, open-source projects
Industry: various (technology-dependent)
Location: global

Entity Name: CrowdStrike
Entity Type: Cybersecurity Company
Industry: Technology (Cybersecurity)
Location: Global (HQ: Sunnyvale, California, USA)
Size: Large Enterprise
Customers Affected: None

Enhanced Monitoring: Real-time Threat IntelligenceAdvanced Monitoring

Remediation Measures: Manual device recovery, system reboots

Remediation Measures: Preventing process suspension

Incident Response Plan Activated: True
Third Party Assistance: Npm Registry Collaboration.
Containment Measures: removal of malicious packages from npm registrykey rotation in public registries
Remediation Measures: audit of environments/developer machinescredential rotation (npm tokens, cloud credentials)monitoring for unauthorized publishes
Recovery Measures: pinning to known-good package versionsawaiting patched releases
Communication Strategy: public statement via GBHackers on Securitycollaboration with npm for technical analysis
Enhanced Monitoring: logs for unusual npm/GitHub activity

Incident Response Plan Activated: True
Containment Measures: Termination of Insider AccessRevocation of Compromised Credentials
Communication Strategy: Public StatementMedia Engagement
Third-Party Assistance: The company involves third-party assistance in incident response through npm registry collaboration, .

Type of Data Compromised: Customer Information, Proprietary Data

Type of Data Compromised: Secrets, Api keys, Cloud credentials, Github tokens
Sensitivity of Data: high
File Types Exposed: environment variablesconfiguration filesCI/CD secrets

Type of Data Compromised: Internal screenshots, Authentication cookies (attempted)
Sensitivity of Data: Moderate (Internal Operational Data, No Customer PII)
File Types Exposed: Screenshots (Images)Cookies (Text)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Manual device recovery, system reboots, Preventing process suspension, , audit of environments/developer machines, credential rotation (npm tokens, cloud credentials), monitoring for unauthorized publishes, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by removal of malicious packages from npm registry, key rotation in public registries, , termination of insider access, revocation of compromised credentials and .

Data Exfiltration: True
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through pinning to known-good package versions, awaiting patched releases, .

Legal Actions: Law Enforcement Investigation,
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Law Enforcement Investigation, .

Lessons Learned: The incident underscores the continuous threats faced by cybersecurity providers and the importance of adopting a comprehensive cybersecurity strategy that includes real-time threat intelligence, advanced monitoring, and the implementation of a Zero Trust architecture to reduce the risk of such attacks.

Lessons Learned: Supply chain attacks via open-source dependencies pose significant risks even to security-focused organizations., Post-install scripts in npm packages can be weaponized for credential theft., Proactive key rotation and environment audits are critical after such incidents.

Lessons Learned: Importance of insider threat monitoring, rapid credential revocation, and proactive dark web intelligence to mitigate leaks from disgruntled or compromised employees. Highlights the growing collaboration among cybercriminal groups (e.g., Scattered Lapsus$ Hunters) in extortion campaigns.

Recommendations: Uninstall compromised npm packages or pin to pre-attack versions., Rotate all potentially exposed credentials (npm, GitHub, cloud)., Monitor for unauthorized npm publishes or GitHub Actions workflows., Implement stricter vetting for open-source dependencies., Use tools like `npm audit` and dependency scanners to detect malicious packages.Uninstall compromised npm packages or pin to pre-attack versions., Rotate all potentially exposed credentials (npm, GitHub, cloud)., Monitor for unauthorized npm publishes or GitHub Actions workflows., Implement stricter vetting for open-source dependencies., Use tools like `npm audit` and dependency scanners to detect malicious packages.Uninstall compromised npm packages or pin to pre-attack versions., Rotate all potentially exposed credentials (npm, GitHub, cloud)., Monitor for unauthorized npm publishes or GitHub Actions workflows., Implement stricter vetting for open-source dependencies., Use tools like `npm audit` and dependency scanners to detect malicious packages.Uninstall compromised npm packages or pin to pre-attack versions., Rotate all potentially exposed credentials (npm, GitHub, cloud)., Monitor for unauthorized npm publishes or GitHub Actions workflows., Implement stricter vetting for open-source dependencies., Use tools like `npm audit` and dependency scanners to detect malicious packages.Uninstall compromised npm packages or pin to pre-attack versions., Rotate all potentially exposed credentials (npm, GitHub, cloud)., Monitor for unauthorized npm publishes or GitHub Actions workflows., Implement stricter vetting for open-source dependencies., Use tools like `npm audit` and dependency scanners to detect malicious packages.

Recommendations: Enhance insider threat detection programs with behavioral analytics., Implement stricter access controls and just-in-time (JIT) privilege escalation., Monitor dark web/Telegram channels for leaked credentials or internal data., Conduct regular security awareness training on social engineering risks (e.g., voice-phishing)., Strengthen collaboration with law enforcement for threat actor disruption.Enhance insider threat detection programs with behavioral analytics., Implement stricter access controls and just-in-time (JIT) privilege escalation., Monitor dark web/Telegram channels for leaked credentials or internal data., Conduct regular security awareness training on social engineering risks (e.g., voice-phishing)., Strengthen collaboration with law enforcement for threat actor disruption.Enhance insider threat detection programs with behavioral analytics., Implement stricter access controls and just-in-time (JIT) privilege escalation., Monitor dark web/Telegram channels for leaked credentials or internal data., Conduct regular security awareness training on social engineering risks (e.g., voice-phishing)., Strengthen collaboration with law enforcement for threat actor disruption.Enhance insider threat detection programs with behavioral analytics., Implement stricter access controls and just-in-time (JIT) privilege escalation., Monitor dark web/Telegram channels for leaked credentials or internal data., Conduct regular security awareness training on social engineering risks (e.g., voice-phishing)., Strengthen collaboration with law enforcement for threat actor disruption.Enhance insider threat detection programs with behavioral analytics., Implement stricter access controls and just-in-time (JIT) privilege escalation., Monitor dark web/Telegram channels for leaked credentials or internal data., Conduct regular security awareness training on social engineering risks (e.g., voice-phishing)., Strengthen collaboration with law enforcement for threat actor disruption.
Key Lessons Learned: The key lessons learned from past incidents are The incident underscores the continuous threats faced by cybersecurity providers and the importance of adopting a comprehensive cybersecurity strategy that includes real-time threat intelligence, advanced monitoring, and the implementation of a Zero Trust architecture to reduce the risk of such attacks.Supply chain attacks via open-source dependencies pose significant risks even to security-focused organizations.,Post-install scripts in npm packages can be weaponized for credential theft.,Proactive key rotation and environment audits are critical after such incidents.Importance of insider threat monitoring, rapid credential revocation, and proactive dark web intelligence to mitigate leaks from disgruntled or compromised employees. Highlights the growing collaboration among cybercriminal groups (e.g., Scattered Lapsus$ Hunters) in extortion campaigns.

Source: GBHackers on Security

Source: Socket.dev

Source: CrowdStrike Official Statement

Source: Media Reports on Scattered Lapsus$ Hunters Activity
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: GBHackers on Security, and Source: Socket.dev, and Source: CrowdStrike Official Statement, and Source: Media Reports on Scattered Lapsus$ Hunters Activity.

Investigation Status: ongoing (collaboration between CrowdStrike and npm)

Investigation Status: Ongoing (Law Enforcement Involved)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Statement Via Gbhackers On Security, Collaboration With Npm For Technical Analysis, Public Statement and Media Engagement.

Stakeholder Advisories: Crowdstrike Spokesperson Statement Confirming Removal Of Malicious Packages And Key Rotation.
Customer Advisories: Audit environments for unauthorized activity.Rotate secrets and monitor for suspicious publishes.

Stakeholder Advisories: CrowdStrike reassured customers that no systems or customer data were compromised.
Customer Advisories: No action required for customers; incident contained internally.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Crowdstrike Spokesperson Statement Confirming Removal Of Malicious Packages And Key Rotation, Audit Environments For Unauthorized Activity., Rotate Secrets And Monitor For Suspicious Publishes., , CrowdStrike reassured customers that no systems or customer data were compromised. and No action required for customers; incident contained internally..

Entry Point: Phishing Email

Entry Point: Fake job postings

Entry Point: compromised npm packages (e.g., @crowdstrike/commitlint, @crowdstrike/falcon-shoelace)
Backdoors Established: ['malicious `bundle.js` script', 'GitHub Actions workflows']
High Value Targets: Developer Credentials, Ci/Cd Secrets, Cloud Access Tokens,
Data Sold on Dark Web: Developer Credentials, Ci/Cd Secrets, Cloud Access Tokens,

Entry Point: Insider (Terminated Employee)
High Value Targets: Sso Authentication Cookies, Internal Reports (Attempted),
Data Sold on Dark Web: Sso Authentication Cookies, Internal Reports (Attempted),

Root Causes: Compromise Of Crowdstrike'S Npm Publisher Account., Insufficient Vetting Of Post-Install Scripts In Dependencies., Trust In Open-Source Supply Chain Exploited.,
Corrective Actions: Enhanced Security For Npm Publishing Accounts., Automated Scanning For Malicious Post-Install Scripts., Improved Incident Response For Supply Chain Attacks.,

Root Causes: Insider Abuse Of Access Privileges, Inadequate Monitoring Of Credential Exfiltration Attempts, Lack Of Real-Time Dark Web Monitoring For Leaked Internal Data,
Corrective Actions: Termination Of Malicious Insider, Enhanced Monitoring Of Privileged User Activities, Review Of Access Controls For High-Value Internal Data, Proactive Threat Hunting For Scattered Lapsus$ Hunters-Related Activity,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Real-Time Threat Intelligence, Advanced Monitoring, , Npm Registry Collaboration, , Logs For Unusual Npm/Github Activity, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced Security For Npm Publishing Accounts., Automated Scanning For Malicious Post-Install Scripts., Improved Incident Response For Supply Chain Attacks., , Termination Of Malicious Insider, Enhanced Monitoring Of Privileged User Activities, Review Of Access Controls For High-Value Internal Data, Proactive Threat Hunting For Scattered Lapsus$ Hunters-Related Activity, .
Last Attacking Group: The attacking group in the last incident were an Opportunistic Cybercriminals and Scattered Lapsus$ HuntersShinyHuntersScattered Spider.
Most Recent Incident Detected: The most recent incident detected was on 2025-01-07.
Most Significant Data Compromised: The most significant data compromised in an incident were Customer Information, Proprietary Data, developer secrets, API keys, cloud credentials, GitHub tokens, , Internal Screenshots, SSO Authentication Cookies (Attempted) and .
Most Significant System Affected: The most significant system affected in an incident was Windows Computers and and Windows PCsServers and Job seekers' systems and Falcon Sensor and developer machinesCI/CD pipelinesGitHub repositories.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was npm registry collaboration, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were removal of malicious packages from npm registrykey rotation in public registries and Termination of Insider AccessRevocation of Compromised Credentials.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were cloud credentials, GitHub tokens, API keys, developer secrets, Customer Information, Proprietary Data, SSO Authentication Cookies (Attempted) and Internal Screenshots.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Law Enforcement Investigation, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Proactive key rotation and environment audits are critical after such incidents., Importance of insider threat monitoring, rapid credential revocation, and proactive dark web intelligence to mitigate leaks from disgruntled or compromised employees. Highlights the growing collaboration among cybercriminal groups (e.g., Scattered Lapsus$ Hunters) in extortion campaigns.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Uninstall compromised npm packages or pin to pre-attack versions., Monitor for unauthorized npm publishes or GitHub Actions workflows., Implement stricter vetting for open-source dependencies., Enhance insider threat detection programs with behavioral analytics., Monitor dark web/Telegram channels for leaked credentials or internal data., Conduct regular security awareness training on social engineering risks (e.g., voice-phishing)., Rotate all potentially exposed credentials (npm, GitHub, cloud)., Strengthen collaboration with law enforcement for threat actor disruption., Use tools like `npm audit` and dependency scanners to detect malicious packages. and Implement stricter access controls and just-in-time (JIT) privilege escalation..
Most Recent Source: The most recent source of information about an incident are Socket.dev, Media Reports on Scattered Lapsus$ Hunters Activity, CrowdStrike Official Statement and GBHackers on Security.
Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (collaboration between CrowdStrike and npm).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was CrowdStrike spokesperson statement confirming removal of malicious packages and key rotation, CrowdStrike reassured customers that no systems or customer data were compromised., .
Most Recent Customer Advisory: The most recent customer advisory issued were an Audit environments for unauthorized activity.Rotate secrets and monitor for suspicious publishes. and No action required for customers; incident contained internally.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Fake job postings, Phishing Email, compromised npm packages (e.g., @crowdstrike/commitlint, @crowdstrike/falcon-shoelace) and Insider (Terminated Employee).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Compromise of CrowdStrike's npm publisher account.Insufficient vetting of post-install scripts in dependencies.Trust in open-source supply chain exploited., Insider abuse of access privilegesInadequate monitoring of credential exfiltration attemptsLack of real-time dark web monitoring for leaked internal data.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Enhanced security for npm publishing accounts.Automated scanning for malicious post-install scripts.Improved incident response for supply chain attacks., Termination of malicious insiderEnhanced monitoring of privileged user activitiesReview of access controls for high-value internal dataProactive threat hunting for Scattered Lapsus$ Hunters-related activity.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.