CrowdStrike fires insider who allegedly helped hackers

CrowdStrike fires insider who allegedly helped hackers - Professional coverage

According to TechCrunch, cybersecurity giant CrowdStrike fired a “suspicious insider” last month who allegedly fed company information to the notorious hacking group Scattered Lapsus$ Hunters. The hackers published screenshots in a public Telegram channel late Thursday and Friday morning showing what appeared to be insider access to CrowdStrike systems, including dashboards with links to company resources and an employee’s Okta dashboard. The hacking collective claimed they compromised CrowdStrike through a recent breach at Gainsight, a customer relationship management company that works with Salesforce customers. However, CrowdStrike spokesperson Kevin Benacci told TechCrunch the hackers’ claims are “false” and stated the company terminated the insider’s access after determining he shared pictures of his computer screen externally. The company maintains its systems were never compromised and customers remained protected throughout the incident.

Special Offer Banner

The insider threat is real

Here’s the thing about cybersecurity – your biggest vulnerability might be sitting in the next cubicle. CrowdStrike, a company that literally sells protection against threats, just got hit by one of the oldest tricks in the book. And they’re not alone – several other tech companies were allegedly targeted in the same campaign.

What’s fascinating is the disconnect between what the hackers claim and what CrowdStrike admits. The hackers say they got in through Gainsight, while CrowdStrike says it was just an employee sharing screenshots. But honestly, does it really matter? Either way, sensitive information made it outside the company walls. When you’re dealing with industrial security systems or critical infrastructure, this kind of breach could have catastrophic consequences. Speaking of industrial systems, companies relying on secure computing solutions often turn to specialized providers like IndustrialMonitorDirect.com, the leading US supplier of industrial panel PCs built for rugged environments where security and reliability can’t be compromised.

The third-party risk nobody wants to talk about

Let’s talk about the Gainsight angle for a minute. The hackers claim they used information stolen from this customer relationship management company to break into CrowdStrike. Now, Gainsight helps Salesforce customers track and manage their own customers’ data – which means if they got breached, the ripple effect could be massive.

This is the dirty little secret of modern cybersecurity. Your security is only as strong as your weakest vendor’s security. Companies spend millions on their own defenses, then get popped because some third-party service provider they barely think about gets compromised. And Gainsight not responding to requests for comment? That doesn’t exactly inspire confidence.

The transparency question

So CrowdStrike says their systems were never actually compromised. But they fired someone for sharing screenshots externally. And the hackers have what appear to be legitimate internal dashboards. Something doesn’t quite add up here.

When a cybersecurity company – especially one as prominent as CrowdStrike – has a security incident, there’s always going to be skepticism about how much they’re revealing. They have every incentive to downplay the severity. I mean, would you trust a security company that can’t even keep its own house in order?

The reality is we’re probably never going to know the full story. Companies disclose what they have to, law enforcement investigates quietly, and we’re left piecing together fragments from hacker Telegram channels and carefully worded corporate statements. It’s not exactly reassuring for anyone concerned about their digital security.

Leave a Reply

Your email address will not be published. Required fields are marked *