Advertisement · 728 × 90
#
Hashtag
#CrowdStrikeoutage
Advertisement · 728 × 90
Preview
Patient Care Technology Disruptions Linked With the CrowdStrike Outage, Study Finds  A little more than a year ago, nearly 8.5 million Windows-based IT systems went down due to a simple error made during a routine software update. Computers were unable to reboot for several hours due to a bug from CrowdStrike, a cybersecurity business whose products are used to detect and respond to security attacks. Many of the systems needed further manual patches, which prolonged the outage. The estimated financial toll? Anywhere between $5 billion and $10 billion for Fortune 500 firms – and close to $2 billion for the healthcare sector specifically. A new report reveals that the negative repercussions on healthcare organisations have gone far beyond financial. A study published in JAMA Network Open by the University of California San Diego found that the incident triggered measurable disruptions in a large proportion of US hospitals, including technical issues that impacted basic operations, research activities, and direct patient care. The researchers discovered that immediately following the CrowdStrike upgrade on July 19, 759 hospitals (out of 2232 with available data) had measurable service disruptions. That represents more than one-third of healthcare organisations. Of a total of 1098 service outages across those organisations, 21.8% were patient-facing and had a direct impact on patient care. Just over 15% were relevant to health-care operations, with 5.3% affecting research activities. The remaining 57% were either not classified as significant or unknown.  “Patient-facing services spanned imaging platforms, prehospital medicine health record systems, patient transfer portals, access to secure documentation, and staff portals for viewing patient details,” the researchers explained. “In addition to staff portals, we saw outages in patient access platforms across diverse hospital systems; these platforms, when operating as usual, allow patients to schedule appointments, contact health care practitioners, access laboratory results, and refill prescriptions.”  Additionally, some hospitals experienced outages in laboratory information systems (LIS), behavioural health apps, and patient monitoring systems like foetal monitors and cardiac telemetry devices. Software in development or pre-deployment stages, informational pages, educational resources for medical and nursing students, or donation pages for institutions were primarily impacted by the outages classified as irrelevant or unknown. 3.9% of hospitals had outages longer than 48 hours, while the majority of hospital services returned within 6 hours. Outages lasting longer than two full days were most common in hospitals in South Carolina, Maryland, and New Jersey. With the majority of assessed hospitals returning to service within six hours, Southern US organizations—including those in Tennessee, North Carolina, Louisiana, Alabama, Texas, and Florida—were among the quickest to recover. The incident served as a stark reminder that human error is and always will be a serious threat to even the most resilient-seeming technologies, while also highlighting the extraordinarily fragile nature of the modern, hyperconnected healthcare ecosystem. CrowdStrike criticised the UCSD research methods and findings, but it also acknowledged and apologised to its customers and other impacted parties for the disruption and promised to be focused on enhancing the resilience of its platform.

Patient Care Technology Disruptions Linked With the CrowdStrike Outage, Study Finds #CrowdStrikeoutage #CyberSecurity #HospitalSystem

1 0 0 0
Preview
DanaBot Malware Enables Data Breaches and Russian Espionage   The United States has taken decisive action to eliminate one of the most persistent cybercrime threats in history by joining forces with international law enforcement bodies and several private cybersecurity companies to dismantle the infrastructure behind the notorious malware operation known as DanaBot, whose origins were linked to Russian state security interests over the past decade.  During this multi-year campaign, hundreds of thousands of infected devices throughout the world were effectively cut off from the botnet's command and control channels by the seizure of the DanaBot server systems hosted within the United States. As CrowdStrike, the leading security company involved in the takedown, reports, the Defence Criminal Investigative Service (DCIS) has neutralised the operators’ ability to issue malicious directives.  Thus, this criminal enterprise, as well as the wider network of Russian cyberproxies that are increasingly dependent on criminal syndicates for the advancement of their state-sponsored objective, has been disrupted by the operation. DanaBot, a banking Trojan that was tracked by security researchers under the name Scully Spider, has evolved over the years into a sophisticated tool that is capable of stealing credentials, espionaging, and leaking large quantities of data, which is an indication of the convergence between the interests of financial groups and geopolitical agents in espionage.  A key aspect of cyber defence that is underscoring the importance of dismantling malware infrastructure is its ability to protect critical systems and expose hidden alliances that sustain digital espionage on a global scale, which is why the operation demonstrates the rise in the stakes of cyber defence. Identified and named in May of 2018 by Proofpoint researchers, DanaBot emerged at that time as a significant example of cybercrime malware that was provided as a service at a time when banking trojans predominated the landscape of email-delivered threats. Initially, DanaBot was a popular payload for the prolific threat actor group TA547, who soon adopted it as their favourite payload, and it soon became a popular choice for other prominent cybercriminal collectives who wanted to take advantage of its versatility. The malware’s architecture was made up of an ever-evolving array of modules which performed both loader operations as well as core malicious functionality, in addition to sophisticated anti-analysis mechanisms that were aimed at frustrating security researchers and evading detection.  Analysts from Proofpoint pointed out that DanaBot's technical signatures were distinct from earlier strains of financially motivated malware, including resemblances to Reveton ransomware, CryptXXX and others, suggesting that there was a more incremental evolution than an entirely new approach in this malware.  There are a number of interesting facts about the name of this threat, including that it originated internally, after one researcher suggested that it be named in honour of a colleague's decision that the threat actors later adopted to market this malware to other criminals on the black market.  A significant footprint was established by DanaBot in the email threat ecosystem during the period between 2018 and 2020 as a result of its extensive distribution by prominent cybercrime groups such as TA547, TA571, and TA564, allowing this threat to establish a substantial presence until its presence waned towards the middle of 2020.  As a result of this decline, the cybercriminal underground as a whole shifted in the direction of a new generation of loaders, botnets, and information stealers, like IcedID and Qbot, which became increasingly the precursors to high-impact ransomware attacks, in parallel with broader trends within the cybercriminal underground. A resurgence of DanaBot activity has been confirmed through recent security telemetry, suggesting that the malware has been revised to meet the evolving needs of cybercrime as well as state-aligned espionage.  There is no doubt that this resurgence of threat actors underscores their persistence in adapting to changing environments and continually recycling and retooling established attack frameworks to maintain their dominance in the global cyber world. At the heart of DanaBot was SCULLY SPIDER, an eCrime adversary based in Russia that developed and commercialised the malware to create a highly lucrative Malware-as-a-Service (MaaS) platform.  It was DanaBot's modular design that set it apart from competing threats in May of 2018, which made it a rapidly spreading threat among cybercriminals, enabling clients to take advantage of credit card theft, large-scale wire fraud, and the targeted exfiltration of cryptocurrency wallets and related data that enabled its rapid adoption in the criminal underground as a result. As a result of DanaBot's adaptability as well as its robust monetisation features, its adoption across the criminal underground has been swift.  There was, however, something that separated this operation from the typical financial-motivated campaigns in that the Russian authorities appeared to have given SCULLY SPIDER some latitude in their handling of the matter. Russian law enforcement is indeed capable of disrupting or prosecuting these activities, but they have not demonstrated a public record of doing so to date. A pattern of tacit acceptance in cybercrime can be attributed to the Russian state's geopolitical strategy, which makes use of cybercriminals as de facto proxy forces to exert asymmetric pressure upon Western institutions while maintaining plausible deniability in the process. In its early stages, DanaBot was primarily targeting financial institutions and individuals in Ukraine, Poland, Italy, Germany, Austria, and Australia in its early phases. A malware attack in October 2018, signalling the malware's operators' ambition to reach a higher-value target in mature financial markets, signalled the malware's operators' ambition to expand their target to banks and payment platforms. DanaBot's technical sophistication was evident from the very outset: early modules included Zeus-derived web injections, credential harvesting, keystroke logging, screen capture, and covert remote access using HVNC components - all of which enabled it to operate remotely.  As Russia's cyber ecosystem has developed, the capabilities and covert operations of the country's principal security and intelligence agencies, including the Federal Security Service, the Foreign Intelligence Service and the General Staff (GRU), have formed the foundation of its formidable cyber ecosystem. Although not all of these entities are directly involved in financially motivated cybercrime, such as ransomware campaigns or the deployment of banking trojans, their connection with criminal hacking groups and willingness to rely on cyber proxies has helped create an environment where global threats remain persistent.  There has been a significant increase in ransomware attacks over the past few years, and it is now one of the most destructive forms of cyber intrusion in history. Ransomware uses malicious code to encrypt or lock down entire systems when executed on an unsuspecting victim. After that, hackers often demand payment, often in hard-to-trace cryptocurrencies like Bitcoin and Ethereum, to regain access to their computer. In addition to being profitable and disruptive, this strategy has played an important role in the proliferation of numerous cybercrime groups based in Russia. As a matter of fact, Centre 18 has a long history of combining state-aligned espionage with criminal hacking, and the FSB's main cyber unit has been a prominent player in the intersection of cybersecurity. About a decade ago, this unit made headlines for hiring a former hacker as a deputy director, an act that presaged a series of subsequent scandals.  CCentre18 was implicated as being responsible for high-profile intrusions targeting U.S. political organisations during the 2016 presidential election, while the GRU, Russia's military intelligence agency, carried out parallel operations to extract sensitive data and disrupt democratic processes in parallel with them. The trajectory of Centre 18 came to a dramatic end when its leaders were exposed to an internal corruption scandal that resulted in charges of state treason being filed against the director, the hacker-turned-deputy director and several accomplices, who were all found guilty.  While this setback may have had a significant impact on the pattern of cooperation between Russian intelligence services and criminal hackers, the overall pattern has remained relatively unchanged. In particular, one noteworthy example is that Russian hacker Aleksei Belan was recruited by the organisation. Belan is alleged to have played a significant role in the theft of billions of Yahoo email accounts in a breach widely regarded as the largest in history, which is widely regarded as an unprecedented event.  The state-tolerated actors have been joined by groups such as Evil Corp that have developed a sprawling cybercrime operation. As a result of Evil Corp's development of Dridex (also called Bugat), the notorious banking trojan and ransomware toolkit, Maksim Yakubets' team was credited with the creation of this notorious malware. Yakubets was indicted by the U.S. Department of Justice in 2019 for orchestrating attacks resulting in an estimated $100 million in fraud, demonstrating how ransomware has become a preferred weapon for profit as well as geopolitical manipulation. As well as stealing banking credentials, DanaBot's operators and criminal affiliates showed an extraordinary ability to perpetrate creative fraud schemes against the broader online economy.  The users of DanaBot were eager to exploit any digital avenue available for illicit profit, and often chose e-commerce platforms as an ideal target because of their vulnerability to manipulation. It is worth noting that in a particularly notable case documented in the Kalinkin complaint, an affiliate used DanaBot to infiltrate an online storefront and orchestrate fictitious returns and fraudulent purchases.  In leveraging stolen account credentials, the attackers were able to secure refund payments that far exceeded the original transaction amounts, causing significant financial losses to the retailer, who was unaware of the problem. A number of the victims were online merchants, who sustained fraud across their sales channels due to the malware's adaptability, which goes beyond conventional banking intrusions in order to show the malware's ability to adapt.  As well as the variety and technical sophistication of the infection pathways used to facilitate these campaigns, DanaBot also routinely entered victim environments through large-scale spam email distributions and malvertising campaigns, which directed users to malicious sites containing exploits. It has also been observed that the malware is sometimes delivered as a secondary payload onto compromised systems, including those already compromised by loaders such as SmokeLoader, which firmly entrenches its position on the computer. One particularly audacious approach that CrowdStrike observed in November 2021 involved enclosing DanaBot within a compromised version of the npm JavaScript runtime package, which was downloaded nearly 9 million times per week. By using this approach, the attackers demonstrated a willingness to exploit trusted software supply chains. ESET researchers found that of all of these distribution methods, Google AdWords was identified as the most effective distribution method among them. In addition to creating malicious websites that appeared highly relevant to popular search queries, affiliates purchased paid ad placements to ensure their fraudulent links appeared prominently among legitimate results. Affiliates used this strategy to distribute their malicious websites across the web.  A combination of social engineering techniques and manipulations of advertising platforms enticed unsuspecting users to download DanaBot under the guise of legitimate programs and services, resulting in the download of DanaBot. In addition to the deception of DanaBot operators, they also set up counterfeit IT support websites that claimed to be helpful resources for resolving technical problems. Those sites enticed users into copying and executing terminal commands, which, in reality, would initiate the process of installing malware.  DanaBot's criminal network sustained a formidable presence with a multifaceted strategy involving email, ads, poisoned software packages, and fake support infrastructure. This illustrates how modern cybercrime has evolved into an agile enterprise that thrives on innovation, collaboration, and the exploitation of trust at all levels of the digital ecosystem, underpinning modern cybercrime as a modern enterprise.  A critical lesson is that organisations should be aware of the constantly evolving threat landscape, as demonstrated by DanaBot. Many lessons can be gleaned from the longevity and reincarnation of the malware. Even well-known malware can still be very effective when attackers continually adjust their delivery methods, infrastructure, and monetisation strategies as well.  It is essential that companies, especially those operating in the financial or personal data sector, are aware that resilience does not simply mean the protection of perimeters. Managing a proactive security posture, monitoring the supply chain dependencies continuously, and educating employees about social engineering are crucial pillars of protection.  Moreover, there have been many instances of poisoned software repositories and malicious advertising, which underscores why we must scrutinise trusted channels as closely as we do untrusted channels. In a broader policy context, DanaBot's trajectory shows the strategic advantage that permissive or complicit nation-states can confer on cybercriminal operations through providing havens in which malware authors can refine and scale their capabilities without fear of disruption, and therefore providing a competitive advantage to cybercriminals.  In light of this dynamic, regulators as well as multinational corporations must rethink traditional risk models and adopt intelligence-driven approaches to track threat actors beyond their technical signatures, scrutinising the threat actors' infrastructure, partnerships, and geopolitical ties of those actors.  It is likely that malware-as-a-service platforms such as DanaBot will remain a persistent threat in the coming years, evolving along with changes in both underground economies and global political environments. For collective defences to be strengthened, coordination between the public and private sectors will be required, as well as the timely sharing of indicators of compromise and greater transparency from technology providers whose platforms are so often exploited as distribution channels by cyber criminals.  Amidst a cybercrime era that has increasingly blurred into state-sponsored campaigns, vigilance, adaptability, and shared responsibility are no longer optional. They are the foundations on which digital trust and critical systems can be safeguarded as well as protected from a threat that doesn't seem to be receding.

DanaBot Malware Enables Data Breaches and Russian Espionage #CrowdStrikeoutage #DanaBot #DataBreaches

0 0 0 0
Preview
CrowdStrike offers a $10 apology gift card to say sorry for outage CrowdStrike, the cybersecurity firm that crashed millions of computers with a botched update all over the world last week, is offering its partners a $10 Uber Eats gift card as an apology, according to several people who say they received the gift card,…

#Security #CrowdStrike #crowdstrikeoutage #cybersecurity CrowdStrike offers a $10 apology gift card to say sorry for outage: CrowdStrike, the cybersecurity firm that crashed millions of computers with a botched update all over the world last week, is offering its partners a $10 Uber Eats gift card…

0 0 0 0
Preview
How to prevent your software update from being the next CrowdStrike There is no fool proof way to prevent a buggy update like CrowdStrike's, but there are best practices that could mitigate the fallout. © 2024 TechCrunch. All rights reserved. For personal use only.

#Enterprise #CrowdStrike #crowdstrikeoutage #featureflags How to prevent your software update from being the next CrowdStrike: There is no fool proof way to prevent a buggy update like CrowdStrike's, but there are best practices that could mitigate the fallout.


© 2024 TechCrunch. All rights…

0 0 0 0
Preview
Gartner IDs Recovery Steps for CrowdStrike 'Blue Screen' Outage On Monday, global technology advisory firm Gartner released a research note outlining short-term, intermediate, and long-term measures Cro...

Gartner has leased a research note outlining short-term, intermediate, and long-term measures CrowdStrike users can implement to deal with what’s become the update from hell. #CrowdStrikeOutage #BlueScreenOfDeath #OpportunisticAttacks
tinyurl.com/3ycyhpvk

0 0 0 0
Preview
US cyber agency CISA says malicious hackers are ‘taking advantage’ of CrowdStrike outage CISA confirmed the CrowdStrike outage was not caused by a cyberattack, but urged caution as malicious hackers exploit the situation. © 2024 TechCrunch. All rights reserved. For personal use only.

#Security #CrowdStrike #crowdstrikeoutage #cyberattacks US cyber agency CISA says malicious hackers are ‘taking advantage’ of CrowdStrike outage: CISA confirmed the CrowdStrike outage was not caused by a cyberattack, but urged caution as malicious hackers exploit the situation.


© 2024…

0 0 0 0
Preview
WNBA on Instagram: "🚨A very important message from our @indianafever duo @eweezy_3 and @kelz_hoop 🚨 Tune in TONIGHT to see Kelsey take the stage at @att All Star Friday Night. Starting at 9pm ET On ESPN 📺" 6,102 likes, 177 comments - wnba on July 19, 2024: "🚨A very important message from our @indianafever duo @eweezy_3 and @kelz_hoop 🚨 Tune in TONIGHT to see Kelsey take the stage at @att All Star Friday Night. Starting at 9pm ET On ESPN 📺".

Kelsey Mitchell will replace Erica Wheeler in tonight's All-Star Skills Challenge. Wheeler's flight was canceled. #CrowdStrikeOutage
https://www.instagram.com/p/C9nttDSSE6V/?img_index=2

0 0 0 0

On behalf of all IT and Helpdesk people today. Please don't say "Good Morning" or "Happy Friday". It's not good. We're not happy.

#CrowdStrikeOutage

1 0 0 0

Man, if I was Tim Apple (sic) right now!? The BSOD memes I'd be spamming the internet with... Oof! 😂 😂
#CrowdstrikeOutage #Apple #Windows

0 0 0 0

Please ensure to verify before leaving for your appointment today as outage at Crowdstrike and Microsoft have caused global disruptions to numerous businesses. #microsoftoutage #crowdstrikeoutage

0 0 0 0

The world is coming to an end, and one iddy biddy computer file is to blame. #crowdstrikeoutage

1 0 0 0