Security

Cyber-crime

Cybercrooks spell trouble with typosquatting domains amid CrowdStrike crisis

Latest trend follows various malware campaigns that began just hours after IT calamity


Thousands of typosquatting domains are now registered to exploit the desperation of IT admins still struggling to recover from last week's CrowdStrike outage, researchers say.

According to security shop SentinelOne, the number is growing by the day, however, current attempts are still relatively unsophisticated and largely opportunistic.

Typosquatting, as Reg readers know, is the term given to cybercrime that involves registering domains of interest but with small typos in the hope of catching genuine users and ultimately exploiting them for money.

Looking at examples of these campaigns, it's difficult to see what admin in their right mind would fall for this kind of crud, yet clearly some people think there's a business opportunity here.

Various forms of extortion and phishing have been spotted on these domains, and the most popular route appears to be themed around the sale of a fix.

SentinelOne offered one example, the now-dead URL for which was fix-crowdstrike-apocalypse[.]com, and showed how an executable to fix the BSOD issues was selling for €500,000 ($543,000) and the source code for it selling for double.

Looking at that URL, who's getting fooled by this, really? A tech-illiterate user, maybe. CrowdStrike caters to the enterprise crowd, the professionals, so it's difficult to see how successful this would be, especially with prices like that.

Every campaign is different and potentially not quite as vacuous as this one. Some of the other domains, for example, are ever so slightly trickier:

Financial extortion isn't the only play either. Some researchers were reporting as early as Saturday, the day after the outage began, that phishing campaigns were under way designed to deliver remote access trojans such as Remcos disguised as hotfixes.

The incident wasn't isolated and CrowdStrike was forced to issue a public memo on the same day warning against opportunistic cybercriminals exploiting the situation.

"CrowdStrike Intelligence recommends that organizations ensure they are communicating with CrowdStrike representatives through official channels and adhere to technical guidance the CrowdStrike support teams have provided," it said.

Another warning came on Monday after the vendor spotted a Word document riddled with malicious macros doing the rounds, leading to a previously unidentified information stealer it now calls Daolpu.

Outage woes persist

Some CrowdStrike customers are still in the process of recovering their machines from BSOD errors days after the botched Falcon update.

So far, one of the best routes out of the trouble has been to repeatedly reboot affected machines and hope for the best. That's Microsoft's guidance for Azure VMs anyway. 

CrowdStrike has regularly updated its dedicated remediation page for the incident since Friday, with a number of methods now available to customers, and it's the first port of call for anyone still struggling to recover.

Information was being disseminated across social media, from various accounts, in the early hours of the incident – even from the director of OverWatch at CrowdStrike, Brody Nisbet. Nisbet has since deleted all of his xeets about the matter, replacing them with a pointer to the remediation page.

"If you're visiting my timeline looking for tweets on remediation guidance, they were removed when we stood up a public-facing web page to centralize our response," he said today.

According to some admins who have reported their experience of dealing with CrowdStrike directly in the last few hours, the vendor is encouraging customers to opt into an initiative that allows CrowdStrike itself to remediate affected endpoints from the cloud.

It requires contact with the support portal, doesn't work every time, and the feedback from others who say they've gone through the process has been mixed.

Some report a rapid acceleration in the remediation process with hundreds of endpoints fixed in rapid time, while others are stuck rebooting several times over in a largely hit-and-miss endeavor.

Security expert Kevin Beaumont echoed the issues: "CrowdStrike are touting auto-remediation of blue screen as an opt-in feature.

"However, I just tried it – it's not very successful, most boots still blue screen of death. I think CS need to be careful on messaging about this as it sounds like they're offering it as a silver bullet. It only works if networking kicks in and the agent updates before Windows finishes booting." ®

Send us news
4 Comments

CrowdStrike's meltdown didn't dent its market dominance … yet

Total revenue for Q2 grew 32 percent

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

House to grill CrowdStrike exec on epic IT meltdown... no, not the CEO

VP Adam Meyers to testify about that faulty software update which ruined July and some of August

RansomHub-linked EDR-killing malware spotted in the wild

Also: Your external-facing NetSuite sites need a review; five popular malware varieties for Q2, and more

This uni thought it would be a good idea to do a phishing test with a fake Ebola scare

Needless to say, it backfired in a big way

Ransomware batters critical industries, but takedowns hint at relief

Whether attack slowdown continues downward trend is the million dollar question that security researchers can't answer

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

CrowdStrike deja vu as 'performance issue' leaves systems sluggish

Not related to the massive outage in July, security biz spokesperson told us

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle