ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities. Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value. CrowdStrike: We stop breaches.

CrowdStrike A.I CyberSecurity Scoring

CrowdStrike

Company Details

Linkedin ID:

crowdstrike

Employees number:

10,400

Number of followers:

955,946

NAICS:

541514

Industry Type:

Computer and Network Security

Homepage:

crowdstrike.com

IP Addresses:

604

Company ID:

CRO_1661713

Scan Status:

Completed

AI scoreCrowdStrike Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/crowdstrike.jpeg
CrowdStrike Computer and Network Security
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCrowdStrike Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/crowdstrike.jpeg
CrowdStrike Computer and Network Security
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CrowdStrike Company CyberSecurity News & History

Past Incidents
9
Attack Types
3
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
CrowdStrikeBreach50211/2025
Rankiteo Explanation :
Attack limited on finance or reputation

Description: CrowdStrike confirmed that internal screenshots were leaked by a terminated employee to the **Scattered Lapsus$ Hunters** cybercrime collective and published on Telegram. The incident involved an insider allegedly paid **$25,000** by **ShinyHunters** for access, including SSO authentication cookies. However, CrowdStrike detected the unauthorized activity and revoked the insider’s access before any critical systems or customer data were compromised. The company stated that **no breach of its systems occurred**, and **no customer data was exposed**.The leak was part of a broader extortion campaign by **Scattered Lapsus$ Hunters**, a collective linked to high-profile breaches at companies like **Google, Cisco, and Jaguar Land Rover** (which suffered **$220M in damages**). The group has also targeted **Salesforce, FedEx, Disney, and Marriott** through voice-phishing and ransomware-as-a-service (RaaS) platforms like **ShinySp1d3r**. While the incident involved insider-driven data exposure, CrowdStrike maintained that its core security infrastructure remained intact, and law enforcement was engaged for further investigation.

CrowdStrikeBreach6031/2025
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: On January 7, 2025, CrowdStrike fell victim to a sophisticated phishing campaign that abused its recruitment branding, leading potential job applicants to inadvertently install a cryptominer, specifically the XMRig. The attackers crafted convincing phishing emails, promising the prospects a junior developer position and directing them to a fraudulent website. This site offered a fake 'employee CRM application,' which was, in reality, malware in the guise of a Windows executable. The attackers included evasion techniques to avoid detection, and upon passing these checks, the malware proceeded to use the victim's resources to mine cryptocurrency. This not only misused the company's resources but also possibly damaged its reputation among potential job applicants.

CrowdStrikeBreach10057/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: A defective update to the CrowdStrike Falcon platform led to worldwide service outages, crashing Windows PCs and servers. This affected various critical sectors including air travel, hospitals, banks, and educational institutions, causing widespread operational disruptions and service unavailability.

CrowdStrikeCyber Attack2511/2025
Rankiteo Explanation :
Attack without any consequences

Description: CrowdStrike experienced a phishing campaign misusing its recruitment brand to distribute a fraudulent 'employee CRM application' which, when downloaded and executed, installs the XMRig cryptominer. Attackers lured job seekers with fake junior developer positions, directing them to a deceptive site where they could download the malware under the guise of necessary software for a recruitment call. The Rust-written Windows executable had evasion tactics to circumvent security analysis and would initiate mining activities upon successful deceit. This campaign not only abused CrowdStrike's brand for distributing malware but also targeted individuals seeking employment.

CrowdStrikeCyber Attack10057/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: CrowdStrike faced significant disruption after releasing a flawed software update to its Falcon platform, which caused Windows computers to malfunction. The issue caused widespread operational delays and opened the door for opportunistic cybercriminals to launch 'CrowdStrike Support' scams. These threat actors targeted the company's customers and others affected, creating websites and sending phishing emails masquerading as support staff, exacerbating the initial damage and misleading victims during a vulnerable time.

CrowdStrikeCyber Attack100503/2023
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: CrowdStrike, a leader in cloud-delivered endpoint protection, faced a sophisticated cyber attack aiming to compromise its sensitive data and internal systems. The attack showcased the evolving tactics, techniques, and procedures (TTPs) of adversaries targeting cybersecurity firms. The attackers attempted to exploit vulnerabilities and deploy malware to access customer information and proprietary data. Through rapid detection and response, CrowdStrike was able to mitigate the attack, minimizing the impact on its operations and customer data. This incident underscores the continuous threats faced by cybersecurity providers and the importance of adopting a comprehensive cybersecurity strategy that includes real-time threat intelligence, advanced monitoring, and the implementation of a Zero Trust architecture to reduce the risk of such attacks.

CrowdStrikeCyber Attack10059/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: A **supply chain attack** (dubbed *Shai-Halud*) compromised multiple **npm packages** maintained under CrowdStrike’s official publisher account. Threat actors injected a malicious `bundle.js` script into packages like `@crowdstrike/commitlint`, `@crowdstrike/falcon-shoelace`, and others, which executed covertly upon installation. The payload deployed **TruffleHog**—a legitimate secret-scanning tool—to harvest **developer credentials, API keys, cloud tokens, and CI/CD secrets** from infected systems. Exfiltrated data was sent to a hardcoded attacker-controlled webhook (`hxxps://webhook[.]site/bb8ca5f6-4175-45d2-b042-fc9ebb8170b7`). The attack also **created unauthorized GitHub Actions workflows** in victim repositories, risking further compromise. While CrowdStrike removed the malicious versions and rotated keys, the breach exposed **internal development environments, CI/CD pipelines, and potentially proprietary code or customer-integrated systems**. The incident mirrors prior attacks on libraries like `tinycolor`, highlighting systemic risks in open-source supply chains. Organizations using these packages were urged to **uninstall affected versions, rotate all exposed secrets, and audit systems** for unauthorized modifications. CrowdStrike confirmed the **Falcon sensor platform remained unaffected**, but the attack undermined trust in their open-source tooling and posed **operational, reputational, and security risks** for dependent enterprises.

CrowdStrikeVulnerability8543/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Security researchers at SEC Consult uncovered a vulnerability in CrowdStrike's Falcon Sensor, named 'Sleeping Beauty,' that let attackers bypass detection mechanisms and execute malicious applications. Attackers could suspend EDR processes to evade detection once they obtained SYSTEM permissions on Windows, using Process Explorer to suspend Falcon processes. Though CrowdStrike initially did not consider it a security vulnerability, the issue allowed the execution of typically blocked malicious tools. Eventually, CrowdStrike corrected the flaw by preventing process suspension, acknowledging the oversight after researchers discovered the change.

CrowdStrikeVulnerability10057/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: The global crash was triggered by a kernel driver update in CrowdStrike's Falcon software, causing system outages worldwide. Healthcare services were impeded, delaying patient communications and appointments. Emergency services, including 911, suffered from disrupted lines. TV stations like Sky News in the UK temporarily ceased live broadcasts. The issue demanded manual device recovery, which included system reboots, impacting businesses and public bodies. The scale of the event marked a significant setback in operational continuity, service provision, and public trust.

CrowdStrike
Breach
Severity: 50
Impact: 2
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack limited on finance or reputation

Description: CrowdStrike confirmed that internal screenshots were leaked by a terminated employee to the **Scattered Lapsus$ Hunters** cybercrime collective and published on Telegram. The incident involved an insider allegedly paid **$25,000** by **ShinyHunters** for access, including SSO authentication cookies. However, CrowdStrike detected the unauthorized activity and revoked the insider’s access before any critical systems or customer data were compromised. The company stated that **no breach of its systems occurred**, and **no customer data was exposed**.The leak was part of a broader extortion campaign by **Scattered Lapsus$ Hunters**, a collective linked to high-profile breaches at companies like **Google, Cisco, and Jaguar Land Rover** (which suffered **$220M in damages**). The group has also targeted **Salesforce, FedEx, Disney, and Marriott** through voice-phishing and ransomware-as-a-service (RaaS) platforms like **ShinySp1d3r**. While the incident involved insider-driven data exposure, CrowdStrike maintained that its core security infrastructure remained intact, and law enforcement was engaged for further investigation.

CrowdStrike
Breach
Severity: 60
Impact: 3
Seen: 1/2025
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: On January 7, 2025, CrowdStrike fell victim to a sophisticated phishing campaign that abused its recruitment branding, leading potential job applicants to inadvertently install a cryptominer, specifically the XMRig. The attackers crafted convincing phishing emails, promising the prospects a junior developer position and directing them to a fraudulent website. This site offered a fake 'employee CRM application,' which was, in reality, malware in the guise of a Windows executable. The attackers included evasion techniques to avoid detection, and upon passing these checks, the malware proceeded to use the victim's resources to mine cryptocurrency. This not only misused the company's resources but also possibly damaged its reputation among potential job applicants.

CrowdStrike
Breach
Severity: 100
Impact: 5
Seen: 7/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: A defective update to the CrowdStrike Falcon platform led to worldwide service outages, crashing Windows PCs and servers. This affected various critical sectors including air travel, hospitals, banks, and educational institutions, causing widespread operational disruptions and service unavailability.

CrowdStrike
Cyber Attack
Severity: 25
Impact: 1
Seen: 1/2025
Blog:
Rankiteo Explanation
Attack without any consequences

Description: CrowdStrike experienced a phishing campaign misusing its recruitment brand to distribute a fraudulent 'employee CRM application' which, when downloaded and executed, installs the XMRig cryptominer. Attackers lured job seekers with fake junior developer positions, directing them to a deceptive site where they could download the malware under the guise of necessary software for a recruitment call. The Rust-written Windows executable had evasion tactics to circumvent security analysis and would initiate mining activities upon successful deceit. This campaign not only abused CrowdStrike's brand for distributing malware but also targeted individuals seeking employment.

CrowdStrike
Cyber Attack
Severity: 100
Impact: 5
Seen: 7/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: CrowdStrike faced significant disruption after releasing a flawed software update to its Falcon platform, which caused Windows computers to malfunction. The issue caused widespread operational delays and opened the door for opportunistic cybercriminals to launch 'CrowdStrike Support' scams. These threat actors targeted the company's customers and others affected, creating websites and sending phishing emails masquerading as support staff, exacerbating the initial damage and misleading victims during a vulnerable time.

CrowdStrike
Cyber Attack
Severity: 100
Impact: 5
Seen: 03/2023
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: CrowdStrike, a leader in cloud-delivered endpoint protection, faced a sophisticated cyber attack aiming to compromise its sensitive data and internal systems. The attack showcased the evolving tactics, techniques, and procedures (TTPs) of adversaries targeting cybersecurity firms. The attackers attempted to exploit vulnerabilities and deploy malware to access customer information and proprietary data. Through rapid detection and response, CrowdStrike was able to mitigate the attack, minimizing the impact on its operations and customer data. This incident underscores the continuous threats faced by cybersecurity providers and the importance of adopting a comprehensive cybersecurity strategy that includes real-time threat intelligence, advanced monitoring, and the implementation of a Zero Trust architecture to reduce the risk of such attacks.

CrowdStrike
Cyber Attack
Severity: 100
Impact: 5
Seen: 9/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: A **supply chain attack** (dubbed *Shai-Halud*) compromised multiple **npm packages** maintained under CrowdStrike’s official publisher account. Threat actors injected a malicious `bundle.js` script into packages like `@crowdstrike/commitlint`, `@crowdstrike/falcon-shoelace`, and others, which executed covertly upon installation. The payload deployed **TruffleHog**—a legitimate secret-scanning tool—to harvest **developer credentials, API keys, cloud tokens, and CI/CD secrets** from infected systems. Exfiltrated data was sent to a hardcoded attacker-controlled webhook (`hxxps://webhook[.]site/bb8ca5f6-4175-45d2-b042-fc9ebb8170b7`). The attack also **created unauthorized GitHub Actions workflows** in victim repositories, risking further compromise. While CrowdStrike removed the malicious versions and rotated keys, the breach exposed **internal development environments, CI/CD pipelines, and potentially proprietary code or customer-integrated systems**. The incident mirrors prior attacks on libraries like `tinycolor`, highlighting systemic risks in open-source supply chains. Organizations using these packages were urged to **uninstall affected versions, rotate all exposed secrets, and audit systems** for unauthorized modifications. CrowdStrike confirmed the **Falcon sensor platform remained unaffected**, but the attack undermined trust in their open-source tooling and posed **operational, reputational, and security risks** for dependent enterprises.

CrowdStrike
Vulnerability
Severity: 85
Impact: 4
Seen: 3/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Security researchers at SEC Consult uncovered a vulnerability in CrowdStrike's Falcon Sensor, named 'Sleeping Beauty,' that let attackers bypass detection mechanisms and execute malicious applications. Attackers could suspend EDR processes to evade detection once they obtained SYSTEM permissions on Windows, using Process Explorer to suspend Falcon processes. Though CrowdStrike initially did not consider it a security vulnerability, the issue allowed the execution of typically blocked malicious tools. Eventually, CrowdStrike corrected the flaw by preventing process suspension, acknowledging the oversight after researchers discovered the change.

CrowdStrike
Vulnerability
Severity: 100
Impact: 5
Seen: 7/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: The global crash was triggered by a kernel driver update in CrowdStrike's Falcon software, causing system outages worldwide. Healthcare services were impeded, delaying patient communications and appointments. Emergency services, including 911, suffered from disrupted lines. TV stations like Sky News in the UK temporarily ceased live broadcasts. The issue demanded manual device recovery, which included system reboots, impacting businesses and public bodies. The scale of the event marked a significant setback in operational continuity, service provision, and public trust.

Ailogo

CrowdStrike Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for CrowdStrike

Incidents vs Computer and Network Security Industry Average (This Year)

CrowdStrike has 986.96% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

CrowdStrike has 681.25% more incidents than the average of all companies with at least one recorded incident.

Incident Types CrowdStrike vs Computer and Network Security Industry Avg (This Year)

CrowdStrike reported 5 incidents this year: 2 cyber attacks, 0 ransomware, 1 vulnerabilities, 2 data breaches, compared to industry peers with at least 1 incident.

Incident History — CrowdStrike (X = Date, Y = Severity)

CrowdStrike cyber incidents detection timeline including parent company and subsidiaries

CrowdStrike Company Subsidiaries

SubsidiaryImage

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities. Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value. CrowdStrike: We stop breaches.

Loading...
similarCompanies

CrowdStrike Similar Companies

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s

newsone

CrowdStrike CyberSecurity News

November 17, 2025 06:06 PM
10 cybersecurity terms investors should know, and 2 industry-leading stocks to buy

2025 is proving to be a defining year for cybersecurity, with the rise of artificial intelligence that can both defend and attack computer...

November 17, 2025 03:55 PM
CrowdStrike Reports North America and Europe as Leading Targets for Ransomware Attacks

In its 2025 European Threat Landscape report, CrowdStrike has revealed some alarming trends in cyber-attacks, placing Europe as the second-most targeted...

November 17, 2025 03:52 PM
F5 and CrowdStrike partner to bring perimeter security to BIG-IP

F5 and CrowdStrike announced a new alliance that embeds the CrowdStrike Falcon Sensor directly into F5's BIG-IP family of network operations...

November 17, 2025 01:00 PM
CrowdStrike Named One of the Top 25 Workplaces in the World in 2025

AUSTIN, Texas, November 17, 2025--CrowdStrike (NASDAQ: CRWD) today announced it has been named to Fortune World's Best Workplaces™ in 2025...

November 17, 2025 08:47 AM
Top Cybersecurity Stocks Worth Watching - November 14th

CrowdStrike, Palo Alto Networks, Fortinet, Globant, SentinelOne, BlackBerry, and Arqit Quantum are the seven Cybersecurity stocks to watch...

November 15, 2025 05:37 PM
New AI Security Alliances and Google Recognition Might Change the Case for Investing in CrowdStrike (CRWD)

In recent weeks, CrowdStrike announced several significant developments, including its selection as an inaugural partner in the Google...

November 15, 2025 08:00 AM
Top Cybersecurity Stocks To Keep An Eye On - November 13th

CrowdStrike, Palo Alto Networks, Fortinet, Globant, and SentinelOne are the five Cybersecurity stocks to watch today, according to...

November 15, 2025 03:15 AM
Promising Cybersecurity Stocks To Keep An Eye On - November 11th

CrowdStrike, Palo Alto Networks, Fortinet, Globant, and SentinelOne are the five Cybersecurity stocks to watch today, according to...

November 14, 2025 12:15 AM
Anthropic Reveals AI-Led Hack, Reshaping Cybersecurity Landscape

Anthropic reveals the first AI-orchestrated cyberattack using Claude, sending shockwaves through cybersecurity stocks and reshaping defense...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CrowdStrike CyberSecurity History Information

Official Website of CrowdStrike

The official website of CrowdStrike is http://www.crowdstrike.com.

CrowdStrike’s AI-Generated Cybersecurity Score

According to Rankiteo, CrowdStrike’s AI-generated cybersecurity score is 709, reflecting their Moderate security posture.

How many security badges does CrowdStrike’ have ?

According to Rankiteo, CrowdStrike currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does CrowdStrike have SOC 2 Type 1 certification ?

According to Rankiteo, CrowdStrike is not certified under SOC 2 Type 1.

Does CrowdStrike have SOC 2 Type 2 certification ?

According to Rankiteo, CrowdStrike does not hold a SOC 2 Type 2 certification.

Does CrowdStrike comply with GDPR ?

According to Rankiteo, CrowdStrike is not listed as GDPR compliant.

Does CrowdStrike have PCI DSS certification ?

According to Rankiteo, CrowdStrike does not currently maintain PCI DSS compliance.

Does CrowdStrike comply with HIPAA ?

According to Rankiteo, CrowdStrike is not compliant with HIPAA regulations.

Does CrowdStrike have ISO 27001 certification ?

According to Rankiteo,CrowdStrike is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of CrowdStrike

CrowdStrike operates primarily in the Computer and Network Security industry.

Number of Employees at CrowdStrike

CrowdStrike employs approximately 10,400 people worldwide.

Subsidiaries Owned by CrowdStrike

CrowdStrike presently has no subsidiaries across any sectors.

CrowdStrike’s LinkedIn Followers

CrowdStrike’s official LinkedIn profile has approximately 955,946 followers.

NAICS Classification of CrowdStrike

CrowdStrike is classified under the NAICS code 541514, which corresponds to Others.

CrowdStrike’s Presence on Crunchbase

No, CrowdStrike does not have a profile on Crunchbase.

CrowdStrike’s Presence on LinkedIn

Yes, CrowdStrike maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/crowdstrike.

Cybersecurity Incidents Involving CrowdStrike

As of November 27, 2025, Rankiteo reports that CrowdStrike has experienced 9 cybersecurity incidents.

Number of Peer and Competitor Companies

CrowdStrike has an estimated 2,775 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at CrowdStrike ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability, Breach and Cyber Attack.

How does CrowdStrike detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an enhanced monitoring with real-time threat intelligence, enhanced monitoring with advanced monitoring, and remediation measures with manual device recovery, system reboots, and remediation measures with preventing process suspension, and and third party assistance with npm registry collaboration, and containment measures with removal of malicious packages from npm registry, containment measures with key rotation in public registries, and remediation measures with audit of environments/developer machines, remediation measures with credential rotation (npm tokens, cloud credentials), remediation measures with monitoring for unauthorized publishes, and recovery measures with pinning to known-good package versions, recovery measures with awaiting patched releases, and communication strategy with public statement via gbhackers on security, communication strategy with collaboration with npm for technical analysis, and enhanced monitoring with logs for unusual npm/github activity, and and and containment measures with termination of insider access, containment measures with revocation of compromised credentials, and communication strategy with public statement, communication strategy with media engagement..

Incident Details

Can you provide details on each incident ?

Incident : Cyber Attack

Title: Sophisticated Cyber Attack on CrowdStrike

Description: CrowdStrike, a leader in cloud-delivered endpoint protection, faced a sophisticated cyber attack aiming to compromise its sensitive data and internal systems. The attack showcased the evolving tactics, techniques, and procedures (TTPs) of adversaries targeting cybersecurity firms. The attackers attempted to exploit vulnerabilities and deploy malware to access customer information and proprietary data. Through rapid detection and response, CrowdStrike was able to mitigate the attack, minimizing the impact on its operations and customer data. This incident underscores the continuous threats faced by cybersecurity providers and the importance of adopting a comprehensive cybersecurity strategy that includes real-time threat intelligence, advanced monitoring, and the implementation of a Zero Trust architecture to reduce the risk of such attacks.

Type: Cyber Attack

Attack Vector: Malware, Vulnerability Exploitation

Motivation: Data Theft, Access to Proprietary Data

Incident : Software Update Issue and Phishing Campaign

Title: CrowdStrike Falcon Platform Software Update Disruption

Description: CrowdStrike faced significant disruption after releasing a flawed software update to its Falcon platform, which caused Windows computers to malfunction. The issue caused widespread operational delays and opened the door for opportunistic cybercriminals to launch 'CrowdStrike Support' scams. These threat actors targeted the company's customers and others affected, creating websites and sending phishing emails masquerading as support staff, exacerbating the initial damage and misleading victims during a vulnerable time.

Type: Software Update Issue and Phishing Campaign

Attack Vector: PhishingMalicious Websites

Vulnerability Exploited: Flawed Software Update

Threat Actor: Opportunistic Cybercriminals

Motivation: ScamPhishing

Incident : Software Malfunction

Title: Global Crash Triggered by CrowdStrike Falcon Software Update

Description: The global crash was triggered by a kernel driver update in CrowdStrike's Falcon software, causing system outages worldwide. Healthcare services were impeded, delaying patient communications and appointments. Emergency services, including 911, suffered from disrupted lines. TV stations like Sky News in the UK temporarily ceased live broadcasts. The issue demanded manual device recovery, which included system reboots, impacting businesses and public bodies. The scale of the event marked a significant setback in operational continuity, service provision, and public trust.

Type: Software Malfunction

Vulnerability Exploited: Kernel driver update

Incident : Service Outage

Title: CrowdStrike Falcon Platform Outage

Description: A defective update to the CrowdStrike Falcon platform led to worldwide service outages, crashing Windows PCs and servers. This affected various critical sectors including air travel, hospitals, banks, and educational institutions, causing widespread operational disruptions and service unavailability.

Type: Service Outage

Incident : Phishing

Title: Phishing Campaign Targeting CrowdStrike Job Applicants

Description: On January 7, 2025, CrowdStrike fell victim to a sophisticated phishing campaign that abused its recruitment branding, leading potential job applicants to inadvertently install a cryptominer, specifically the XMRig. The attackers crafted convincing phishing emails, promising the prospects a junior developer position and directing them to a fraudulent website. This site offered a fake 'employee CRM application,' which was, in reality, malware in the guise of a Windows executable. The attackers included evasion techniques to avoid detection, and upon passing these checks, the malware proceeded to use the victim's resources to mine cryptocurrency. This not only misused the company's resources but also possibly damaged its reputation among potential job applicants.

Date Detected: 2025-01-07

Type: Phishing

Attack Vector: Phishing Email

Motivation: Financial Gain

Incident : Phishing

Title: Phishing Campaign Targeting Job Seekers

Description: CrowdStrike experienced a phishing campaign misusing its recruitment brand to distribute a fraudulent 'employee CRM application' which, when downloaded and executed, installs the XMRig cryptominer. Attackers lured job seekers with fake junior developer positions, directing them to a deceptive site where they could download the malware under the guise of necessary software for a recruitment call. The Rust-written Windows executable had evasion tactics to circumvent security analysis and would initiate mining activities upon successful deceit. This campaign not only abused CrowdStrike's brand for distributing malware but also targeted individuals seeking employment.

Type: Phishing

Attack Vector: Fake job postings and malicious downloads

Motivation: Cryptomining

Incident : Vulnerability Exploitation

Title: Sleeping Beauty Vulnerability in CrowdStrike's Falcon Sensor

Description: Security researchers at SEC Consult uncovered a vulnerability in CrowdStrike's Falcon Sensor, named 'Sleeping Beauty,' that let attackers bypass detection mechanisms and execute malicious applications. Attackers could suspend EDR processes to evade detection once they obtained SYSTEM permissions on Windows, using Process Explorer to suspend Falcon processes. Though CrowdStrike initially did not consider it a security vulnerability, the issue allowed the execution of typically blocked malicious tools. Eventually, CrowdStrike corrected the flaw by preventing process suspension, acknowledging the oversight after researchers discovered the change.

Type: Vulnerability Exploitation

Attack Vector: Process Suspension

Vulnerability Exploited: Sleeping Beauty

Motivation: Bypass Detection Mechanisms

Incident : supply chain attack

Title: Supply Chain Attack on CrowdStrike npm Packages (Shai-Halud Attack)

Description: A supply chain attack compromised multiple npm packages maintained by the crowdstrike-publisher account, part of the ongoing 'Shai-Halud attack.' Threat actors injected a malicious `bundle.js` script into these packages, which executes covert tasks post-installation. The payload downloads and runs **TruffleHog**, a legitimate secret-scanning tool, to harvest tokens, API keys, and cloud credentials from host systems. Compromised secrets are then exfiltrated to a hardcoded webhook endpoint (`hxxps://webhook[.]site/bb8ca5f6-4175-45d2-b042-fc9ebb8170b7`). The attack also creates unauthorized GitHub Actions workflows in affected repositories. Affected packages were swiftly removed by the npm registry, but organizations are urged to audit environments, rotate credentials, and monitor for unauthorized activity.

Type: supply chain attack

Attack Vector: compromised npm packagesmalicious dependency injectionpost-install script execution

Vulnerability Exploited: supply chain trust abusenpm package hijackingCI/CD pipeline compromise

Motivation: credential harvestingunauthorized accesspotential follow-on attacks

Incident : Insider Threat

Title: CrowdStrike Insider Threat Incident Involving Scattered Lapsus$ Hunters

Description: CrowdStrike confirmed that internal screenshots shared by a now-terminated employee were leaked by the Scattered Lapsus$ Hunters cybercrime collective on Telegram. The company stated that no breach of its systems occurred and no customer data was exposed. The insider allegedly sold access to ShinyHunters for $25,000, including SSO authentication cookies, but CrowdStrike detected and terminated the insider’s access before further damage. The incident is linked to broader extortion campaigns by Scattered Lapsus$ Hunters, targeting high-profile companies like Google, Cisco, and Jaguar Land Rover.

Type: Insider Threat

Attack Vector: Insider Threat (Malicious Employee)Social Engineering (Voice-Phishing)Credential Theft (SSO Authentication Cookies)Dark Web/Telegram Leak

Vulnerability Exploited: Human Factor (Insider Access Abuse)

Threat Actor: Scattered Lapsus$ HuntersShinyHuntersScattered Spider

Motivation: Financial GainExtortionReputation DamageData Theft for Resale

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing Email, Fake job postings, compromised npm packages (e.g., @crowdstrike/commitlint, @crowdstrike/falcon-shoelace) and Insider (Terminated Employee).

Impact of the Incidents

What was the impact of each incident ?

Incident : Cyber Attack CRO001050724

Data Compromised: Customer Information, Proprietary Data

Systems Affected: Internal Systems

Incident : Software Update Issue and Phishing Campaign CRO000072024

Systems Affected: Windows Computers

Operational Impact: Widespread Operational Delays

Incident : Software Malfunction CRO000072024

Systems Affected: Global systems

Downtime: Significant

Operational Impact: High

Brand Reputation Impact: Significant

Incident : Service Outage CRO001073024

Systems Affected: Windows PCsServers

Downtime: Widespread operational disruptions and service unavailability

Operational Impact: Critical sectors affected including air travel, hospitals, banks, and educational institutions

Incident : Phishing CRO000011125

Operational Impact: Misuse of Company Resources

Brand Reputation Impact: Possible Damage

Incident : Phishing CRO000011425

Systems Affected: Job seekers' systems

Brand Reputation Impact: CrowdStrike's brand abuse

Incident : Vulnerability Exploitation CRO404030625

Systems Affected: Falcon Sensor

Incident : supply chain attack CRO1092210091625

Data Compromised: Developer secrets, Api keys, Cloud credentials, Github tokens

Systems Affected: developer machinesCI/CD pipelinesGitHub repositories

Operational Impact: unauthorized npm publishesmalicious GitHub Actions workflowscredential rotation overhead

Brand Reputation Impact: potential erosion of trust in CrowdStrike's open-source ecosystem

Identity Theft Risk: ['high (due to exposed credentials)']

Incident : Insider Threat CRO4432044112225

Data Compromised: Internal screenshots, Sso authentication cookies (attempted)

Operational Impact: Minimal (No System Breach or Customer Data Exposure)

Brand Reputation Impact: Moderate (Public Disclosure of Insider Incident)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Customer Information, Proprietary Data, Secrets, Api Keys, Cloud Credentials, Github Tokens, , Internal Screenshots, Authentication Cookies (Attempted) and .

Which entities were affected by each incident ?

Incident : Cyber Attack CRO001050724

Entity Name: CrowdStrike

Entity Type: Company

Industry: Cybersecurity

Incident : Software Update Issue and Phishing Campaign CRO000072024

Entity Name: CrowdStrike

Entity Type: Company

Industry: Cybersecurity

Incident : Software Malfunction CRO000072024

Entity Name: CrowdStrike

Entity Type: Software Company

Industry: Cybersecurity

Customers Affected: Global

Incident : Service Outage CRO001073024

Entity Name: CrowdStrike

Entity Type: Cybersecurity Company

Industry: Technology

Location: Global

Customers Affected: Air travel, Hospitals, Banks, Educational institutions

Incident : Phishing CRO000011125

Entity Name: CrowdStrike

Entity Type: Company

Industry: Cybersecurity

Incident : Phishing CRO000011425

Entity Name: CrowdStrike

Entity Type: Company

Industry: Cybersecurity

Incident : Vulnerability Exploitation CRO404030625

Entity Name: CrowdStrike

Entity Type: Company

Industry: Cybersecurity

Incident : supply chain attack CRO1092210091625

Entity Name: CrowdStrike

Entity Type: cybersecurity company

Industry: technology/security

Incident : supply chain attack CRO1092210091625

Entity Name: Organizations using compromised npm packages

Entity Type: developers, enterprises, open-source projects

Industry: various (technology-dependent)

Location: global

Incident : Insider Threat CRO4432044112225

Entity Name: CrowdStrike

Entity Type: Cybersecurity Company

Industry: Technology (Cybersecurity)

Location: Global (HQ: Sunnyvale, California, USA)

Size: Large Enterprise

Customers Affected: None

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Cyber Attack CRO001050724

Enhanced Monitoring: Real-time Threat IntelligenceAdvanced Monitoring

Incident : Software Malfunction CRO000072024

Remediation Measures: Manual device recovery, system reboots

Incident : Vulnerability Exploitation CRO404030625

Remediation Measures: Preventing process suspension

Incident : supply chain attack CRO1092210091625

Incident Response Plan Activated: True

Third Party Assistance: Npm Registry Collaboration.

Containment Measures: removal of malicious packages from npm registrykey rotation in public registries

Remediation Measures: audit of environments/developer machinescredential rotation (npm tokens, cloud credentials)monitoring for unauthorized publishes

Recovery Measures: pinning to known-good package versionsawaiting patched releases

Communication Strategy: public statement via GBHackers on Securitycollaboration with npm for technical analysis

Enhanced Monitoring: logs for unusual npm/GitHub activity

Incident : Insider Threat CRO4432044112225

Incident Response Plan Activated: True

Containment Measures: Termination of Insider AccessRevocation of Compromised Credentials

Communication Strategy: Public StatementMedia Engagement

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through npm registry collaboration, .

Data Breach Information

What type of data was compromised in each breach ?

Incident : Cyber Attack CRO001050724

Type of Data Compromised: Customer Information, Proprietary Data

Incident : supply chain attack CRO1092210091625

Type of Data Compromised: Secrets, Api keys, Cloud credentials, Github tokens

Sensitivity of Data: high

File Types Exposed: environment variablesconfiguration filesCI/CD secrets

Incident : Insider Threat CRO4432044112225

Type of Data Compromised: Internal screenshots, Authentication cookies (attempted)

Sensitivity of Data: Moderate (Internal Operational Data, No Customer PII)

File Types Exposed: Screenshots (Images)Cookies (Text)

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Manual device recovery, system reboots, Preventing process suspension, , audit of environments/developer machines, credential rotation (npm tokens, cloud credentials), monitoring for unauthorized publishes, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by removal of malicious packages from npm registry, key rotation in public registries, , termination of insider access, revocation of compromised credentials and .

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Insider Threat CRO4432044112225

Data Exfiltration: True

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through pinning to known-good package versions, awaiting patched releases, .

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Insider Threat CRO4432044112225

Legal Actions: Law Enforcement Investigation,

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Law Enforcement Investigation, .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Cyber Attack CRO001050724

Lessons Learned: The incident underscores the continuous threats faced by cybersecurity providers and the importance of adopting a comprehensive cybersecurity strategy that includes real-time threat intelligence, advanced monitoring, and the implementation of a Zero Trust architecture to reduce the risk of such attacks.

Incident : supply chain attack CRO1092210091625

Lessons Learned: Supply chain attacks via open-source dependencies pose significant risks even to security-focused organizations., Post-install scripts in npm packages can be weaponized for credential theft., Proactive key rotation and environment audits are critical after such incidents.

Incident : Insider Threat CRO4432044112225

Lessons Learned: Importance of insider threat monitoring, rapid credential revocation, and proactive dark web intelligence to mitigate leaks from disgruntled or compromised employees. Highlights the growing collaboration among cybercriminal groups (e.g., Scattered Lapsus$ Hunters) in extortion campaigns.

What recommendations were made to prevent future incidents ?

Incident : supply chain attack CRO1092210091625

Recommendations: Uninstall compromised npm packages or pin to pre-attack versions., Rotate all potentially exposed credentials (npm, GitHub, cloud)., Monitor for unauthorized npm publishes or GitHub Actions workflows., Implement stricter vetting for open-source dependencies., Use tools like `npm audit` and dependency scanners to detect malicious packages.Uninstall compromised npm packages or pin to pre-attack versions., Rotate all potentially exposed credentials (npm, GitHub, cloud)., Monitor for unauthorized npm publishes or GitHub Actions workflows., Implement stricter vetting for open-source dependencies., Use tools like `npm audit` and dependency scanners to detect malicious packages.Uninstall compromised npm packages or pin to pre-attack versions., Rotate all potentially exposed credentials (npm, GitHub, cloud)., Monitor for unauthorized npm publishes or GitHub Actions workflows., Implement stricter vetting for open-source dependencies., Use tools like `npm audit` and dependency scanners to detect malicious packages.Uninstall compromised npm packages or pin to pre-attack versions., Rotate all potentially exposed credentials (npm, GitHub, cloud)., Monitor for unauthorized npm publishes or GitHub Actions workflows., Implement stricter vetting for open-source dependencies., Use tools like `npm audit` and dependency scanners to detect malicious packages.Uninstall compromised npm packages or pin to pre-attack versions., Rotate all potentially exposed credentials (npm, GitHub, cloud)., Monitor for unauthorized npm publishes or GitHub Actions workflows., Implement stricter vetting for open-source dependencies., Use tools like `npm audit` and dependency scanners to detect malicious packages.

Incident : Insider Threat CRO4432044112225

Recommendations: Enhance insider threat detection programs with behavioral analytics., Implement stricter access controls and just-in-time (JIT) privilege escalation., Monitor dark web/Telegram channels for leaked credentials or internal data., Conduct regular security awareness training on social engineering risks (e.g., voice-phishing)., Strengthen collaboration with law enforcement for threat actor disruption.Enhance insider threat detection programs with behavioral analytics., Implement stricter access controls and just-in-time (JIT) privilege escalation., Monitor dark web/Telegram channels for leaked credentials or internal data., Conduct regular security awareness training on social engineering risks (e.g., voice-phishing)., Strengthen collaboration with law enforcement for threat actor disruption.Enhance insider threat detection programs with behavioral analytics., Implement stricter access controls and just-in-time (JIT) privilege escalation., Monitor dark web/Telegram channels for leaked credentials or internal data., Conduct regular security awareness training on social engineering risks (e.g., voice-phishing)., Strengthen collaboration with law enforcement for threat actor disruption.Enhance insider threat detection programs with behavioral analytics., Implement stricter access controls and just-in-time (JIT) privilege escalation., Monitor dark web/Telegram channels for leaked credentials or internal data., Conduct regular security awareness training on social engineering risks (e.g., voice-phishing)., Strengthen collaboration with law enforcement for threat actor disruption.Enhance insider threat detection programs with behavioral analytics., Implement stricter access controls and just-in-time (JIT) privilege escalation., Monitor dark web/Telegram channels for leaked credentials or internal data., Conduct regular security awareness training on social engineering risks (e.g., voice-phishing)., Strengthen collaboration with law enforcement for threat actor disruption.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are The incident underscores the continuous threats faced by cybersecurity providers and the importance of adopting a comprehensive cybersecurity strategy that includes real-time threat intelligence, advanced monitoring, and the implementation of a Zero Trust architecture to reduce the risk of such attacks.Supply chain attacks via open-source dependencies pose significant risks even to security-focused organizations.,Post-install scripts in npm packages can be weaponized for credential theft.,Proactive key rotation and environment audits are critical after such incidents.Importance of insider threat monitoring, rapid credential revocation, and proactive dark web intelligence to mitigate leaks from disgruntled or compromised employees. Highlights the growing collaboration among cybercriminal groups (e.g., Scattered Lapsus$ Hunters) in extortion campaigns.

References

Where can I find more information about each incident ?

Incident : supply chain attack CRO1092210091625

Source: GBHackers on Security

Incident : supply chain attack CRO1092210091625

Source: Socket.dev

Incident : Insider Threat CRO4432044112225

Source: CrowdStrike Official Statement

Incident : Insider Threat CRO4432044112225

Source: Media Reports on Scattered Lapsus$ Hunters Activity

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: GBHackers on Security, and Source: Socket.dev, and Source: CrowdStrike Official Statement, and Source: Media Reports on Scattered Lapsus$ Hunters Activity.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : supply chain attack CRO1092210091625

Investigation Status: ongoing (collaboration between CrowdStrike and npm)

Incident : Insider Threat CRO4432044112225

Investigation Status: Ongoing (Law Enforcement Involved)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Statement Via Gbhackers On Security, Collaboration With Npm For Technical Analysis, Public Statement and Media Engagement.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : supply chain attack CRO1092210091625

Stakeholder Advisories: Crowdstrike Spokesperson Statement Confirming Removal Of Malicious Packages And Key Rotation.

Customer Advisories: Audit environments for unauthorized activity.Rotate secrets and monitor for suspicious publishes.

Incident : Insider Threat CRO4432044112225

Stakeholder Advisories: CrowdStrike reassured customers that no systems or customer data were compromised.

Customer Advisories: No action required for customers; incident contained internally.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Crowdstrike Spokesperson Statement Confirming Removal Of Malicious Packages And Key Rotation, Audit Environments For Unauthorized Activity., Rotate Secrets And Monitor For Suspicious Publishes., , CrowdStrike reassured customers that no systems or customer data were compromised. and No action required for customers; incident contained internally..

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Phishing CRO000011125

Entry Point: Phishing Email

Incident : Phishing CRO000011425

Entry Point: Fake job postings

Incident : supply chain attack CRO1092210091625

Entry Point: compromised npm packages (e.g., @crowdstrike/commitlint, @crowdstrike/falcon-shoelace)

Backdoors Established: ['malicious `bundle.js` script', 'GitHub Actions workflows']

High Value Targets: Developer Credentials, Ci/Cd Secrets, Cloud Access Tokens,

Data Sold on Dark Web: Developer Credentials, Ci/Cd Secrets, Cloud Access Tokens,

Incident : Insider Threat CRO4432044112225

Entry Point: Insider (Terminated Employee)

High Value Targets: Sso Authentication Cookies, Internal Reports (Attempted),

Data Sold on Dark Web: Sso Authentication Cookies, Internal Reports (Attempted),

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : supply chain attack CRO1092210091625

Root Causes: Compromise Of Crowdstrike'S Npm Publisher Account., Insufficient Vetting Of Post-Install Scripts In Dependencies., Trust In Open-Source Supply Chain Exploited.,

Corrective Actions: Enhanced Security For Npm Publishing Accounts., Automated Scanning For Malicious Post-Install Scripts., Improved Incident Response For Supply Chain Attacks.,

Incident : Insider Threat CRO4432044112225

Root Causes: Insider Abuse Of Access Privileges, Inadequate Monitoring Of Credential Exfiltration Attempts, Lack Of Real-Time Dark Web Monitoring For Leaked Internal Data,

Corrective Actions: Termination Of Malicious Insider, Enhanced Monitoring Of Privileged User Activities, Review Of Access Controls For High-Value Internal Data, Proactive Threat Hunting For Scattered Lapsus$ Hunters-Related Activity,

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Real-Time Threat Intelligence, Advanced Monitoring, , Npm Registry Collaboration, , Logs For Unusual Npm/Github Activity, .

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced Security For Npm Publishing Accounts., Automated Scanning For Malicious Post-Install Scripts., Improved Incident Response For Supply Chain Attacks., , Termination Of Malicious Insider, Enhanced Monitoring Of Privileged User Activities, Review Of Access Controls For High-Value Internal Data, Proactive Threat Hunting For Scattered Lapsus$ Hunters-Related Activity, .

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Opportunistic Cybercriminals and Scattered Lapsus$ HuntersShinyHuntersScattered Spider.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2025-01-07.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Customer Information, Proprietary Data, developer secrets, API keys, cloud credentials, GitHub tokens, , Internal Screenshots, SSO Authentication Cookies (Attempted) and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Windows Computers and and Windows PCsServers and Job seekers' systems and Falcon Sensor and developer machinesCI/CD pipelinesGitHub repositories.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was npm registry collaboration, .

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were removal of malicious packages from npm registrykey rotation in public registries and Termination of Insider AccessRevocation of Compromised Credentials.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were cloud credentials, GitHub tokens, API keys, developer secrets, Customer Information, Proprietary Data, SSO Authentication Cookies (Attempted) and Internal Screenshots.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Law Enforcement Investigation, .

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Proactive key rotation and environment audits are critical after such incidents., Importance of insider threat monitoring, rapid credential revocation, and proactive dark web intelligence to mitigate leaks from disgruntled or compromised employees. Highlights the growing collaboration among cybercriminal groups (e.g., Scattered Lapsus$ Hunters) in extortion campaigns.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Uninstall compromised npm packages or pin to pre-attack versions., Monitor for unauthorized npm publishes or GitHub Actions workflows., Implement stricter vetting for open-source dependencies., Enhance insider threat detection programs with behavioral analytics., Monitor dark web/Telegram channels for leaked credentials or internal data., Conduct regular security awareness training on social engineering risks (e.g., voice-phishing)., Rotate all potentially exposed credentials (npm, GitHub, cloud)., Strengthen collaboration with law enforcement for threat actor disruption., Use tools like `npm audit` and dependency scanners to detect malicious packages. and Implement stricter access controls and just-in-time (JIT) privilege escalation..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Socket.dev, Media Reports on Scattered Lapsus$ Hunters Activity, CrowdStrike Official Statement and GBHackers on Security.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (collaboration between CrowdStrike and npm).

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was CrowdStrike spokesperson statement confirming removal of malicious packages and key rotation, CrowdStrike reassured customers that no systems or customer data were compromised., .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Audit environments for unauthorized activity.Rotate secrets and monitor for suspicious publishes. and No action required for customers; incident contained internally.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker were an Fake job postings, Phishing Email, compromised npm packages (e.g., @crowdstrike/commitlint, @crowdstrike/falcon-shoelace) and Insider (Terminated Employee).

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Compromise of CrowdStrike's npm publisher account.Insufficient vetting of post-install scripts in dependencies.Trust in open-source supply chain exploited., Insider abuse of access privilegesInadequate monitoring of credential exfiltration attemptsLack of real-time dark web monitoring for leaked internal data.

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Enhanced security for npm publishing accounts.Automated scanning for malicious post-install scripts.Improved incident response for supply chain attacks., Termination of malicious insiderEnhanced monitoring of privileged user activitiesReview of access controls for high-value internal dataProactive threat hunting for Scattered Lapsus$ Hunters-related activity.

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=crowdstrike' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge