Skip to Content

Cybersecurity Consulting

The DOT Report: The Global CrowdStrike Crisis, 10 Billion Passwords Leaked on Hacking Forum

July 30, 2024

9 minute read

The DOT Report is a monthly news series covering the latest headlines and biggest stories in the cybersecurity space. By reviewing these stories in detail, we can take a closer look at the cybersecurity measures and principles at play in real life incidents.

This month, we review the global CrowdStrike Crisis, discuss the RockYou2024 password leak, zoom in on the latest, and possibly last, SiegedSec attack, and lastly overview the findings from the recent OX Security Report.

Join us below to explore these stories in more depth and the role cybersecurity plays throughout these headlines.

Subscribe to the DOT Security blog for coverage on the biggest stories every month, updates to industry trends and best practices, and information on the newest technologies in the cybersecurity space.

The Global CrowdStrike Crisis

On July 19, 2024, CrowdStrike released a configuration update for its Falcon sensor on Windows systems that led to worldwide outages. The update contained a faulty logic error that caused systems to crash, presenting users with the infamous blue screen of death.

The massive outage is creating a ripple of repercussions, namely major disruptions to business operations across industries, including major airlines like Delta and IT operations worldwide. An estimated 8.5 million devices were affected in the 90 minutes between the update going live and being rolled back, with direct losses to US companies already estimated at $5.4 billion.

CrowdStrike issued a fix shortly after identifying the problem and confirmed that the incident was not related to a cyberattack. The company is conducting a thorough root cause analysis to prevent future occurrences and have pledged to avoid similar situations in the future.

Additionally, CrowdStrike has provided detailed remediation steps for affected customers, including the deletion of specific configuration files causing the crashes. However, this story highlights the risk of systems with a single point of failure, and demonstrates how interconnected the world of technology is becoming with major companies controlling such high market shares.

10 Billion Passwords Leaked on Hacking Forum

In the largest password leak to date, the RockYou2024 compilation contains nearly 10 billion unique plaintext passwords that have likely been sourced over two full decades from over 4,000 databases. This massive data dump, named in reference to the infamous 2009 RockYou breach, was leaked on a popular hacking forum on July 4, 2024.

The implications of this large of a breach are severe for both individuals and organizations as this dataset could easily lead to a series of fraud, identity theft, and other cybercrime. Users who reuse passwords across multiple sites are particularly vulnerable to account takeovers and identity theft in these situations, as there’s a higher chance one of their passwords has been included in a breach.

This emphasizes how integral it is to update passwords on a regular basis, and the value of additional security mechanisms.

Some simple security mechanisms you can implement today are password managers, which generate and store complex passwords, and multi-factor authentication (MFA) protocols. Additionally, organizations are advised to build a layered security strategy, including robust encryption methods and zero-trust security architecture, to protect user data and mitigate the risk of unauthorized access.

The leak underscores the ongoing need for vigilance in cybersecurity practices, emphasizing proactive measures over reactive responses to stay ahead of evolving threats.

SiegedSec Sets Sights on The Heritage Foundation

The hacktivist group SiegedSec is making headlines again this year after targeting the Heritage Foundation and leaking at least 2GB of sensitive data, including donor lists and internal communications.

Known for their affiliation with the "gay furry" community, the group specifically targeted the foundation in protest against Project 2025, a conservative plan aiming to completely reshape U.S. government policies, with particularly harsh policies that would disproportionately affect LGBTQ+ rights.

The leaked data was intended to highlight the extremist right-wing policies included in Project 2025, while calling attention to the various individuals supporting these groups that seek to influence future U.S. policy under a conservative administration.

Though the Heritage Foundation denies being hacked entirely, SiegedSec has released a transcript of a particularly nasty Signal conversation that allegedly transpired between the hacktivist group and the foundation's executive director, Mike Howell, whose tone was anything but friendly.

The group's high-profile actions garnered significant attention, which could be fueling their decision to disband and move on from SiegedSec.

Despite disbanding, however, they reaffirmed their commitment to fighting for LGBTQ+ rights and other social justice causes through different means. The disbandment of SiegedSec underscores the complex interplay between activism, cybersecurity, and mental health in the digital age.

95% of Organizations Have at Least One Critical Risk

A recent OX Security report indicates that 95% of organizations have at least one high or critical risk in their software supply chains, highlighting significant vulnerabilities. The study reveals that the average application security team is responsible for 129 applications and faces over 119,000 security alerts annually.

Common issues include command injection, sensitive data exposure in log files, and cross-site scripting. The report suggests that automated alert analysis can reduce these alerts by more than 97%, allowing teams to focus on the most critical threats.

The report also emphasizes the persistent challenges organizations face in maintaining application security. Despite the high volume of alerts, many vulnerabilities remain unaddressed, leaving organizations exposed to threat actors.

The use of automated tools to triage and prioritize alerts can greatly enhance an organization's ability to manage and mitigate these risks effectively. This approach helps in identifying and addressing the most severe threats, thereby improving overall security posture.

Furthermore, the findings underline the necessity for robust security practices and the adoption of advanced security tools. Organizations must continuously evolve their security strategies to handle the increasing complexity and volume of security alerts. By leveraging automated analysis and prioritization, companies can better protect their software supply chains from potential exploits and operate with more security.

The DOT Report Signing Off

The stories we covered this month serve as a good reminder of just how connected the world is through technology, how important stringent vulnerability management is, and how not all hackers are cut from the same cloth, as groups like SiegedSec use their skills to push for social change, rather than monetary gain.

By investing in a comprehensive and layered cybersecurity strategy, you give your organization the best chance possible at deterring cybercriminals altogether, and rebounding with minimal damage in the case a cyber incident does occur.

Keep up to date on everything cybersecurity, from monthly headlines to industry trends and best practices, by subscribing to the DOT Security blog!