Tuesday, June 24, 2025
  • Login
Whats Current In
Advertisement
  • Cyber Security
No Result
View All Result
  • Cyber Security
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Cybercriminals Exploit CrowdStrike Update Mishap to Distribute Remcos RAT Malware

wcisrvadm by wcisrvadm
July 20, 2024
in Cyber Security
0
Cybercriminals Exploit CrowdStrike Update Mishap to Distribute Remcos RAT Malware
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

This post was originally published on this site

Jul 20, 2024NewsroomMalware / IT Outage

Remcos RAT Malware

Cybersecurity firm CrowdStrike, which is facing the heat for causing worldwide IT disruptions by pushing out a flawed update to Windows devices, is now warning that threat actors are exploiting the situation to distribute Remcos RAT to its customers in Latin America under the guise of a providing a hotfix.

The attack chains involve distributing a ZIP archive file named “crowdstrike-hotfix.zip,” which contains a malware loader named Hijack Loader (aka DOILoader or IDAT Loader) that, in turn, launches the Remcos RAT payload.

Specifically, the archive file also includes a text file (“instrucciones.txt”) with Spanish-language instructions that urges targets to run an executable file (“setup.exe”) to recover from the issue.

Cybersecurity

“Notably, Spanish filenames and instructions within the ZIP archive indicate this campaign is likely targeting Latin America-based (LATAM) CrowdStrike customers,” the company said, attributing the campaign to a suspected e-crime group.

On Friday, CrowdStrike acknowledged that a routine sensor configuration update pushed to its Falcon platform for Windows devices on July 19 at 04:09 UTC inadvertently triggered a logic error that resulted in a Blue Screen of Death (BSoD), rendering numerous systems inoperable and sending businesses into a tailspin.

The event impacted customers running Falcon sensor for Windows version 7.11 and above, who were online between 04:09 and 05:27 a.m. UTC.

Malicious actors have wasted no time capitalizing on the chaos created by the event to set up typosquatting domains impersonating CrowdStrike and advertise services to companies affected by the issue in return for a cryptocurrency payment.

Customers who are impacted are recommended to “ensure they are communicating with CrowdStrike representatives through official channels and adhere to technical guidance the CrowdStrike support teams have provided.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
Previous Post

Microsoft confirms CrowdStrike update also hit Windows 365 PCs

Next Post

UK arrests suspected Scattered Spider hacker linked to MGM attack

wcisrvadm

wcisrvadm

Next Post
UK arrests suspected Scattered Spider hacker linked to MGM attack

UK arrests suspected Scattered Spider hacker linked to MGM attack

Recent Posts

  • Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue
  • How the US Military Is Redefining Zero Trust
  • US House bans WhatsApp on staff devices over security concerns
  • Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers
  • IBM Pushes for More Collaboration Between Security, Governance

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024

Categories

  • Cyber Security

Browse by Category

  • Cyber Security
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Cyber Security

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.