BSI confirms workaround for CrowdStrike and Azure outages
According to the BSI, manually deleting a file fixes startup problems on Windows computers with CrowdStrike software. Microsoft Azure is also causing problems.

BSI confirms workaround for CrowdStrike and Azure outages
According to the BSI, manually deleting a file fixes startup problems on Windows computers with CrowdStrike software. Microsoft Azure is also causing problems.
ICYMI: on the latest #TechstrongTV I join the Gang to go deep on #Google #acquisition of #CNAP (#cloud #cybersecurity) with #Wiz, esp. how it hits #AWS, #Azure, #Cisco, #Splunk, #Crowdstrike, #PANW, ++. Just don't call it #DevSecOps!
Plus, #AI is failing, even for religion!
https://techstrong.tv/videos/videos/techstrong-gang-march-19-2025
ICYMI, on the latest #TechstrongTV I join the Gang to go deep on #Google #acquisition of #CNAP (#cloud #cybersecurity) with #Wiz, esp. how it hits #AWS, #Azure, #Cisco, #Splunk, #Crowdstrike, #PANW, ++. Just don't call it #DevSecOps!
Plus, #AI is failing, even for religion!
https://techstrong.tv/videos/videos/techstrong-gang-march-19-2025
Shedding light on the ABYSSWORKER driver
The ABYSSWORKER driver is a malicious tool used in conjunction with MEDUSA ransomware to disable anti-malware systems. It employs a HEARTCRYPT-packed loader and a revoked certificate-signed driver to target and silence EDR vendors. The driver imitates a legitimate CrowdStrike Falcon driver and uses obfuscation techniques to hinder analysis. It provides various functionalities including file manipulation, process and driver termination, and EDR system disabling. The driver's capabilities include removing callbacks, replacing driver functions, killing system threads, and detaching mini-filter devices. It uses unconventional methods like creating IRPs from scratch to perform file operations. The malware's sophisticated approach demonstrates the evolving tactics of cybercriminals in evading detection and disabling security measures.
Pulse ID: 67dc31a079ea6b0ac92136ae
Pulse Link: https://otx.alienvault.com/pulse/67dc31a079ea6b0ac92136ae
Pulse Author: AlienVault
Created: 2025-03-20 15:17:52
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
ICYMI, on the latest #TechstrongTV I join the Gang to go deep on #Google #acquisition of #CNAP (#cloud #cybersecurity) with #Wiz, esp. how it hits #AWS, #Azure, #Cisco, #Splunk, #Crowdstrike, #PANW, ++. Just don't call it #DevSecOps!
Plus, #AI is failing, even for religion!
https://techstrong.tv/videos/videos/techstrong-gang-march-19-2025
Super new drop from #TechstrongTV! I join the Gang to go deep on #Google #acquisition of #CNAP (#cloud #cybersecurity) with #Wiz, esp. how it hits #AWS, #Azure, #Cisco, #Splunk, #Crowdstrike, #PANW, ++. Just don't call it #DevSecOps!
Plus, #AI is failing, even for religion!
https://techstrong.tv/videos/videos/techstrong-gang-march-19-2025
@FritzAdalis @jerry "Baghdad Bob" gets put into cold storage and is brought out on occasions where his level of obliviousness is appropriate. For example - explaining the #CrowdStrike incident which was neither cyber, nor a security incident as it turns out.
@ip6li @heiseonline
Wenn #crowdstrike das kann, dann kann #russland das sicher auch.
#windowsfree
26 New Threat Groups Spotted in 2024: CrowdStrike – Source: www.securityweek.com https://ciso2ciso.com/26-new-threat-groups-spotted-in-2024-crowdstrike-source-www-securityweek-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #Malware&Threats #securityweekcom #securityweek #CrowdStrike #Report
26 New Threat Groups Spotted in 2024: CrowdStrike https://www.securityweek.com/26-new-threat-groups-spotted-in-2024-crowdstrike/ #Malware&Threats #CrowdStrike #Report
26 New Threat Groups Spotted in 2024: CrowdStrike https://www.securityweek.com/26-new-threat-groups-spotted-in-2024-crowdstrike/ #Malware&Threats #CrowdStrike #Report
Nach den weltweiten Computerstörungen, die im Sommer 2024 durch ein fehlerhaftes Update einer Cybersicherheitslösung verursacht wurden, haben wir als BSI gemeinsam mit #Crowdstrike und #Microsoft den Vorfall aufgearbeitet.
Mehr dazu in unserer Pressemitteilung: https://www.bsi.bund.de/dok/1138130
- Arbeitsrechner an.
- "Wir steigen auf #crowdstrike um, das ist kostengünstiger"
*roflnd gesendet
@emag @roknrol malicious compliance is the way to go. Was accused by HR of cheating on my timesheet, and that "the rules apply to everyone" (i entered the building at 8 am, not 7:57), thus I made sure to also leave on time when #CrowdStrike crowdfucked the company
Fiddling around with jamfnow and crowdstrike. Is there any way to install falcon automatically? Maybe via profiles? I tried to find one, but the crowdstrike docs seem to be incomplete.
Could anyone push me in the right direction?
Marketing gone mad.
No way I'm dealing with them again.
Not for a down under big purple anyway.
Crowdstrike fiasco: New details on the fatal update, BSI warns of attacks
The root of all evil has a name: Channel File 291 has caused massive IT outages worldwide. Meanwhile, the BSI warns against CrowdStrike phishing.
CrowdStrike outages: Microsoft releases recovery tool
Microsoft has published an image for USB sticks that can be used to restore affected systems. Provided you have the BitLocker key.