Widespread IT Outage Due to CrowdStrike Update

    Date: 07/23/2024

    Severity: High

    Summary

    In a notable incident, a widespread IT outage occurred due to an update from CrowdStrike, a cybersecurity company. The update inadvertently disrupted services for numerous organizations reliant on CrowdStrike's software, causing operational disruptions and prompting urgent responses to restore systems and functionality. The incident highlighted the interconnected nature of modern IT infrastructure and underscored the critical importance of rigorous testing and contingency planning in software updates.

    Indicators of Compromise (IOC) List

    IP Address

    213.5.130.58

    Hash

    c44506fe6e1ede5a104008755abf5b6ace51f1a84ad656a2dccc7f2c39c0eca2
    
    02f37a8e3d1790ac90c04bc50de73cd1a93e27caf833a1e1211b9cc6294ecee5
    
    2bdf023c439010ce0a786ec75d943a80a8f01363712bbf69afc29d3e2b5306ed
    
    4f450abaa4daf72d974a830b16f91deed77ba62412804dca41a6d42a7d8b6fd0
    
    52019f47f96ca868fa4e747c3b99cba1b7aa57317bf8ebf9fcbf09aa576fe006
    
    5ae3838d77c2102766538f783d0a4b4205e7d2cdba4e0ad2ab332dc8ab32fea9
    
    6010e2147a0f51a7bfa2f942a5a9eaad9a294f463f717963b486ed3f53d305c2
    
    835f1141ece59c36b18e76927572d229136aeb12eff44cb4ba98d7808257c299
    
    931308cfe733376e19d6cd2401e27f8b2945cec0b9c696aebe7029ea76d45bf6
    
    b1fcb0339b9ef4860bb1ed1e5ba0e148321be64696af64f3b1643d1311028cb3
    
    b6f321a48812dc922b26953020c9a60949ec429a921033cfaf1e9f7d088ee628
    
    be074196291ccf74b3c4c8bd292f92da99ec37a25dc8af651bd0ba3f0d020349
    
    d6d5ff8e9dc6d2b195a6715280c2f1ba471048a7ce68d256040672b801fda0ea
    
    48a3398bbbf24ecd64c27cb2a31e69a6b60e9a69f33fe191bcf5fddbabd9e184

    Gurucul Threat Detection and Incident Response (TDIR) Queries for Detection

    IP Address

    dstipaddress IN ("213.5.130.58") or ipaddress IN ("213.5.130.58") or publicipaddress IN ("213.5.130.58") or srcipaddress IN ("213.5.130.58")

    Hash

    sha256hash IN ("02f37a8e3d1790ac90c04bc50de73cd1a93e27caf833a1e1211b9cc6294ecee5","b6f321a48812dc922b26953020c9a60949ec429a921033cfaf1e9f7d088ee628","835f1141ece59c36b18e76927572d229136aeb12eff44cb4ba98d7808257c299","52019f47f96ca868fa4e747c3b99cba1b7aa57317bf8ebf9fcbf09aa576fe006","c44506fe6e1ede5a104008755abf5b6ace51f1a84ad656a2dccc7f2c39c0eca2","b1fcb0339b9ef4860bb1ed1e5ba0e148321be64696af64f3b1643d1311028cb3","d6d5ff8e9dc6d2b195a6715280c2f1ba471048a7ce68d256040672b801fda0ea","6010e2147a0f51a7bfa2f942a5a9eaad9a294f463f717963b486ed3f53d305c2","2bdf023c439010ce0a786ec75d943a80a8f01363712bbf69afc29d3e2b5306ed","931308cfe733376e19d6cd2401e27f8b2945cec0b9c696aebe7029ea76d45bf6")

    Category: Cybersecurity and Infrastructure Security Agency (CISA)

    Reference:

    https://www.cisa.gov/news-events/alerts/2024/07/19/widespread-it-outage-due-crowdstrike-update

    https://www.crowdstrike.com/blog/likely-ecrime-actor-capitalizing-on-falcon-sensor-issues/


    Tags

    Threat ResearchCISA

    « Previous ArticleNext Article »

    Comments

    No records to display

    Looking for Something?
    Threat Research Categories:
    Tags