Hackers Claiming Breach of CrowdStrike’s Threat Actor Database


A hacktivist entity known as USDoD has claimed to have leaked CrowdStrike’s “entire threat actor list” and alleged possession of the company’s “entire IOC [indicators of compromise] list” containing over 250 million data points.

On July 24, 2024, the USDoD group announced on the English-language cybercrime forum BreachForums that they had obtained and leaked CrowdStrike’s comprehensive threat actor database.

EHA

The group provided a link to download the alleged list and shared sample data fields to substantiate their claims.

The leaked information reportedly includes:

  • Adversary aliases
  • Adversary status
  • The last active dates for each adversary
  • Region/Country of Adversary Origin
  • Number of targeted industries and countries
  • Actor type and motivation
Hackers Claiming Breach of CrowdStrike’s Threat Actor Database
Claim of the breach

The sample data contained “LastActive” dates up to June 2024, while the Falcon portal’s last active dates for some actors extend to July 2024, suggesting the potential timeframe of the data acquisition.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Cyber Press researchers stated that they were able to view some of the documents leaked

Hackers Claiming Breach of CrowdStrike’s Threat Actor Database
Sample documents(source: Cyberpress)
Hackers Claiming Breach of CrowdStrike’s Threat Actor Database
Sample documents 2 (source: Cyberpress)

USDoD has a history of exaggerating claims, likely to enhance its reputation within hacktivist and eCrime communities. For instance, they previously claimed to have conducted a hack-and-leak operation targeting a professional networking platform, which was later refuted by industry sources as mere web scraping.

Since at least 2020, USDoD has engaged in both hacktivism and financially motivated breaches, primarily using social engineering tactics. In recent years, they have focused on high-profile targeted intrusion campaigns and have sought to expand their activities into administering eCrime forums.

USDoD also claimed to possess “two big dbs from an oil company and a pharmacy industry (not from USA)”. However, the connection between these claims and the alleged CrowdStrike data acquisition remains unclear.

The potential leak of CrowdStrike’s threat actor database could greatly impact cybersecurity measures.

  • Compromise of ongoing investigations
  • Exposure of tracking methods for malicious actors
  • Potential advantage for cybercriminals in evading detection

The story unfolds following the CrowdStrike update causes the Windows machine to experience the Blue Screen of Death (BSOD) error.

CrowdStrike’s Response

CrowdStrike, a leading cybersecurity firm known for its threat intelligence and incident response services, has responded. The company stated, “The threat intel data noted in this report is available to tens of thousands of customers, partners, and prospects – and hundreds of thousands of users. Adversaries exploit current events for attention and gain. We remain committed to sharing data with the community.”

While USDoD has been involved in legitimate breaches, its credibility in this specific case is questionable. Their history of exaggeration, the inconsistencies in the leaked data, and CrowdStrike’s response all cast doubt on the authenticity and severity of the claimed leak.

Download Free Cybersecurity Planning Checklist 2024 (PDF) – Download Here



Source link