Categories: Threat Actor

Threat Actors Exploit Recent CrowdStrike Outage to Ramp Up Suspicious Domain Creation

On July 19th, 2024, CrowdStrike, a leading cybersecurity provider of advanced end-point security detection and protection solutions, released a sensor configuration update to Windows systems. This update contained a logic error that resulted in system crashes and Blue Screen of Death (BSOD) incidents. The faulty software update caused widespread disruptions on Friday, affecting critical services in banks, airlines, hospitals, stock markets, and IT industries globally. On July 20th,2024, CrowdStrike released technical details explaining that a logic error in a channel file caused the BSOD. This buggy channel file was designed to detect newly observed malicious named pipes for identifying standard C2 (Command and Control) frameworks in cyberattacks. CrowdStrike also mentioned conducting a thorough root cause analysis to understand how this logic error occurred.

While the entire world is grappling with the outbreak and working to resolve the issues, Threat Actors (TAs) are exploiting this situation to their advantage. Within 24 hours of the incident, TAs created several malicious domains to target individuals/Organizations interested in closely following this incident. The cybersecurity community quickly identified these malicious domains and shared the information via platforms like X (formerly Twitter), LinkedIn, etc.

SANS shared a post on X about a domain named “crowdstrikeclaim.com,” offering a form for impacted organizations to request a free claim review. The form asks for detailed information, including phone number, first name, last name, and email address. Submitting this personal and organizational data could result in identity theft or unauthorized access to accounts.

A well-known security researcher John Hammond shared a post on X about a domain called “crowdstrikebluescreen.com,” which offers services to affected organizations. Verifying such services is crucial, as engaging with misleading or fraudulent offers could lead to additional operational problems and divert resources and attention away from addressing the original incident.

Bernardo Quintero, founder of Virus Total, shared a post on X about TAs exploiting the CrowdStrike incident by distributing malware disguised as a hotfix. The file name suggests that the TAs have created zip domains to distribute the malware.

Conclusion:

The emergence of malicious domains and fraudulent services illustrates the need for heightened caution and verification when dealing with offers and requests related to security incidents. These threats pose risks of identity theft and unauthorized access and can divert valuable resources and attention from resolving the core problem. Furthermore, the distribution of malware disguised as a hotfix demonstrates the adaptability and persistence of TAs in exploiting current events for their gain. In navigating these challenges, it is essential for organizations to remain alert, verify the legitimacy of any claims or services, and maintain robust security practices to safeguard against such threats.

Our Recommendations:

  • Avoid submitting personal or organizational information on sites offering “free claim reviews” or other services related to the incident. These may be scams designed to steal sensitive information.
  • Before engaging with any service or offer related to the incident, verify the provider’s legitimacy.
  • Only follow remediation steps and instructions from CrowdStrike’s official support channels.
  • Use updated antivirus and anti-malware tools to scan for and block malicious files or domains. Stay informed about the latest threats and security measures to protect your systems.
  • Educate employees and stakeholders about recognizing and avoiding scams and phishing attempts.

Indicators of Compromise (IOCs)

IndicatorIndicator TypeDescription
crowdstrikeupdate.comDomainMalicious domain
crowdstrikefix.zipDomainMalicious domain
crowdstrikereport.comDomainMalicious domain
crowdstrike-helpdesk.comDomainMalicious domain
microsoftcrowdstrike.comDomainMalicious domain
crowdstrikeoutage.infoDomainMalicious domain
crowdstrikebsod.comDomainMalicious domain
crowdfalcon-immed-update.comDomainMalicious domain
whatiscrowdstrike.comDomainMalicious domain
fix-crowdstrike-bsod.comDomainMalicious domain
fix-crowdstrike-apocalypse.comDomainMalicious domain
crowdstuck.orgDomainMalicious domain
crowdstriketoken.comDomainMalicious domain
crowdstrikefix.comDomainMalicious domain
crowdstrikedoomsday.comDomainMalicious domain
crowdstrikebluescreen.comDomainMalicious domain
crowdstrike0day.comDomainMalicious domain
crowdstrike-bsod.comDomainMalicious domain
crowdstrike-hotfix.zipDomainMalicious domain
crowdstrikeclaim.comDomainMalicious domain
1e84736efce206dc973acbc16540d3e5 fef212ec979f2fe2f48641160aadeb86b83f7b35 c44506fe6e1ede5a104008755abf5b6ace51f1a84ad656a2dccc7f2c39c0eca2 MD5 SHA1 SHA256crowdstrike-hotfix.zip (Remcos RAT)

Recent Posts

AI-Assisted Phishing Campaign Exploits Browser Permissions to Capture Victim Data

Cyble analyzes an AI-driven phishing campaign that abuses browser permissions to capture victims images and…

March 16, 2026

The Ultimate Guide to Dark Web Monitoring in 2026: Protect Your Data Before Attackers Strike

Dark web intelligence helps organizations detect stolen credentials, leaked data, and cyber threats early, enabling…

March 13, 2026

ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered via Bincrypter-Based Loader

Cyble has identified a new Linux threat named ClipXDaemon that targets cryptocurrency users by intercepting…

March 5, 2026

Middle East on the Brink: Iran-US-Israel Hostilities Trigger Cyber-Kinetic Conflict

Middle East faces unprecedented hybrid warfare as Iran, US, and Israel clash through cyberattacks, missile…

March 3, 2026

ENISA’s Updated Cybersecurity Methodology Aligns with NIS2 and EU Cybersecurity Act

ENISA’s Cybersecurity Exercise Methodology helps organizations align with NIS2 and the EU Cybersecurity Act while…

February 26, 2026

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.