One of the nerds who popped MGM (a member of Scattered Spider) was arrested in the UK. He was 17.
We posted about it, shared the link, but everyone is still pissing on CrowdStrike so we'll talk about it on Monday or something.
We posted about it, shared the link, but everyone is still pissing on CrowdStrike so we'll talk about it on Monday or something.
π94π«‘26π€£16π’13π6π₯°3β€2π₯2π±1
This media is not supported in your browser
VIEW IN TELEGRAM
We're coming across more and more Threat Actors who are children β some as young as 14 years old.
π€78π€£23π’21π17β€9π€―7π₯3π―2
We somehow missed a semi-undocumented CrowdStrike EDR disable* technique that was unveiled in 2022.
It requires administrative access. This makes it more difficult to perform in enterprise environments.
Jonas Lyk discovered the CrowdStrike minifilter did not catch NtCreateFile when the FILE_APPEND_DATA access mask was present. It was possible to open a CrowdStrike driver with FILE_APPEND_DATA and append an additional byte to the driver opened.
When rebooting the machine, the driver signature would not match and CrowdStrike would not load.
It requires administrative access. This makes it more difficult to perform in enterprise environments.
Jonas Lyk discovered the CrowdStrike minifilter did not catch NtCreateFile when the FILE_APPEND_DATA access mask was present. It was possible to open a CrowdStrike driver with FILE_APPEND_DATA and append an additional byte to the driver opened.
When rebooting the machine, the driver signature would not match and CrowdStrike would not load.
π€£108π₯11β€10π€6π±5π«‘3π―2π’1
We have deleted our post addressing the conspiracy theories about the CrowdStrike thing.
We were bombarded with comments and political fighting.
It's Saturday and we're not going to deal with this shit on our weekend. We'll let someone else do it.
We were bombarded with comments and political fighting.
It's Saturday and we're not going to deal with this shit on our weekend. We'll let someone else do it.
π€£105π―19π«‘17π8π€8β€6π€3π2π₯°1π1π’1
Today Microsoft reported that they believe the CrowdStrike bug has impacted roughly 8,500,000 computers.
https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/
https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/
The Official Microsoft Blog
Helping our customers through the CrowdStrike outage
On July 18, CrowdStrike, an independent cybersecurity company, released a software update that began impacting IT systems globally. Although this was not a Microsoft incident, given it impacts our ecosystem, we want to provide an update on the steps weβveβ¦
π€£98π9π₯7π€2π±2π’2β€1
vx-underground
Today Microsoft reported that they believe the CrowdStrike bug has impacted roughly 8,500,000 computers. https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/
To put that into perspective: that is nearly x3 the amount of the entire Linux user baser.
Haha just kidding:) we just wanted to make a jab at Linux nerds because they keep spamming "THIS IS THE YEAR OF THE LINUX DESKTOP"
Haha just kidding:) we just wanted to make a jab at Linux nerds because they keep spamming "THIS IS THE YEAR OF THE LINUX DESKTOP"
π€£96π34π22π’13π₯9π«‘5π€3π2β€1
We've updated the vx-underground malware collection. We have decided to include the recent faulty CrowdStrike drivers which caused 'boot-loops' for users. We believe it serves some historic and/or educational value to researchers or students. We have titled it "Win32.CrowdStruck". It is in the families directory.
- VirusSign.2024.07.13
- VirusSign.2024.07.14
- VirusSign.2024.07.15
- VirusSign.2024.07.16
- VirusSign.2024.07.17
- VirusSign.2024.07.18
- InTheWild.0129
- Win32.CrowdStruck
- CryptoMixRansomware
- AsyncRAT
- ClipBanker
- ProLock
- ThanosRansomware
- Redline
- Vidar
- Sality
- StealC
- RhadamanthysLoader
- RecordBreaker
- NjRAT
- LummaStealer
- PureLogStealer
- CobaltStrike
- VirusSign.2024.07.13
- VirusSign.2024.07.14
- VirusSign.2024.07.15
- VirusSign.2024.07.16
- VirusSign.2024.07.17
- VirusSign.2024.07.18
- InTheWild.0129
- Win32.CrowdStruck
- CryptoMixRansomware
- AsyncRAT
- ClipBanker
- ProLock
- ThanosRansomware
- Redline
- Vidar
- Sality
- StealC
- RhadamanthysLoader
- RecordBreaker
- NjRAT
- LummaStealer
- PureLogStealer
- CobaltStrike
π€£63π29β€10π₯7π€5π4β€βπ₯3π2π«‘2
This media is not supported in your browser
VIEW IN TELEGRAM
POV: you scroll the comment section of literally any Xitter post discussing CrowdStrike (someone is going to make it weirdly political and mention an acronym starting with the letter 'D')
π€£85π―9β€4π3π’1π1
Hello, how are you?
Today is the day of rest.
We hope all of you can find some time to relax too β it's been a chaotic week.
We'll see all of you on Monday.
Today is the day of rest.
We hope all of you can find some time to relax too β it's been a chaotic week.
We'll see all of you on Monday.
β€100π19π13π«‘9π8π’3π3π€£3π€3
Good morning,
After we took Sunday off we anticipated things would calm down a little. We were wrong. There has been more arrests, the CrowdStrike fire is still burning, and the arguing about CrowdStrike continues.
πππ
After we took Sunday off we anticipated things would calm down a little. We were wrong. There has been more arrests, the CrowdStrike fire is still burning, and the arguing about CrowdStrike continues.
πππ
π80π«‘22π₯14β€2π±2π’2π―2π1π1
This media is not supported in your browser
VIEW IN TELEGRAM
> open xitter
> see long winded rants about kernel mode drivers
> see long winded rants about crowdstrike
> see long winded rants about malware
> see long winded rants about kernel mode drivers
> see long winded rants about crowdstrike
> see long winded rants about malware
π45π€21π―6π1π’1
vx-underground
> open xitter > see long winded rants about kernel mode drivers > see long winded rants about crowdstrike > see long winded rants about malware
More annoyed at the fact CrowdStrike has brought in a surge of 'experts' than the actual computer damage at this point. We're going to hear idiotic schizophrenic rants for months
π54π33π€£11π―7π₯°2π2π₯1π’1
vx-underground
The CrowdStrike C-suite LinkedIn apology post tl;dr
Anyway, unless something profoundly dramatic happens, we are no longer going to actively discuss the current CrowdStrike situation. We're fatigued β and various members are combating the fall out in their own way (organizationally, whatever).
tl;dr moving on
tl;dr moving on
π₯°45π16π€7π₯4π3π’1π«‘1
Today (or yesterday depending on where you live) the United States House Leaders called CrowdStrike CEO George Kurtz to testify to congress about the recent botched update. According to Microsoft telemetry, CrowdStrike's botched update boot-looped roughly 8,500,000 computers across the globe β including computer operations regarded as critical infrastructure.
No date has been released yet when George Kurtz will testify.
United States Republicans who lead the United States House Homeland Security commitee stated they 'expect answers soon' from Mr. Kurtz.
Additionally, it is reported that the letter sent to Mr. Kurtz by the United States congress states Mr. Kurtz is 'urged' to schedule a hearing with the subcommitee on Cyber Security and Infrastructure Protection by Wednesday, July 24th, 2024.
Information via Reuters, The Associated Press, and The Washington Post
No date has been released yet when George Kurtz will testify.
United States Republicans who lead the United States House Homeland Security commitee stated they 'expect answers soon' from Mr. Kurtz.
Additionally, it is reported that the letter sent to Mr. Kurtz by the United States congress states Mr. Kurtz is 'urged' to schedule a hearing with the subcommitee on Cyber Security and Infrastructure Protection by Wednesday, July 24th, 2024.
Information via Reuters, The Associated Press, and The Washington Post
π€£43π€29π€6π5
vx-underground
Today (or yesterday depending on where you live) the United States House Leaders called CrowdStrike CEO George Kurtz to testify to congress about the recent botched update. According to Microsoft telemetry, CrowdStrike's botched update boot-looped roughlyβ¦
This by far one of the largest oopsies in cybersecurity history. We can't recall a moment where a vendor caused this much damage... ever. We're aware of instances where updates corrupted something, but nothing on this scale.
They'll probably talk about this in history books.
They'll probably talk about this in history books.
π―70π10π’2π€£1
20 years from now someone is going to write a book about the CrowdStrike disaster. People new to cybersecurity are going to be amazed by it.
The actuality of the situation is most security professionals (and Threat Actors) just shitposted their way through the entire thing
The actuality of the situation is most security professionals (and Threat Actors) just shitposted their way through the entire thing
π89π11π₯4π€£4π2π’1
vx-underground
20 years from now someone is going to write a book about the CrowdStrike disaster. People new to cybersecurity are going to be amazed by it. The actuality of the situation is most security professionals (and Threat Actors) just shitposted their way throughβ¦
There is a REAL WORLD CHANCE your shitty memes could be in a history book πππππ
π€£122π’8π€©8π₯°6π―4π2