Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Cybercriminals are using the CrowdStrike update mishap to spread the Remcos RAT malware
Global Security

Cybercriminals are using the CrowdStrike update mishap to spread the Remcos RAT malware

AdminBy AdminJuly 20, 2024No Comments2 Mins Read
Remcos RAT Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 20, 2024Information hallMalware / IT failure

Remcos RAT malware

Cybersecurity firm CrowdStrike, which has faced allegations of wrongdoing IT disruptions worldwide releasing a flawed update for Windows devices, is now warning that threat actors are exploiting the situation to distribute the Remcos RAT to their customers in Latin America under the guise of providing a fix.

Attack chains include distribution of a ZIP archive file named “crowdstrike-hotfix.zip”, which contains a malware downloader named Hijack bootloader (aka DOILoader or IDAT Loader) which in turn launches the Remcos RAT payload.

Specifically, the archive file also includes a text file (“instrucciones.txt”) with instructions in Spanish that tells the target to run an executable file (“setup.exe”) to repair the problem.

Cyber ​​security

“Notably, the Spanish file names and instructions in the ZIP archive indicate that this campaign is likely targeting CrowdStrike’s Latin American (LATAM) customers,” the company saidattributing the company to a suspected cybercriminal group.

On Friday, CrowdStrike acknowledged that a routine sensor configuration update launched on the Falcon platform for Windows devices on July 19 at 04:09 UTC inadvertently triggered a logic error that resulted in a blue screen of death (BSoD), disabling numerous systems and sending the business into a tailspin. .

The event affected Falcon sensor clients for Windows version 7.11 and higher that were online between 04:09 and 05:27 UTC.

Attackers wasted no time in capitalizing on the chaos created by the event to create typosquatting domains that mimic CrowdStrike and advertise services to companies affected by the issue in exchange for payment in cryptocurrency.

Affected customers are advised to “ensure they communicate with CrowdStrike representatives through official channels and follow the technical guidance provided by CrowdStrike support.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.