The recent global outage caused by an update to CrowdStrike Falcon, CrowdStrike's endpoint detection and response (EDR) system has resulted in the registration of numerous lookalike domains. We suspect that many of these were registered by bad actors with the intention of using them for scams and/or malicious phishing campaigns.
Many lookalike CrowdStrike domains have been registered in the past 3 days.
Due to the suspicious nature of these newly registered domains, we recommend organizations monitor network activity to determine if any of their systems are communicating with these domains.
As these domains are created, Stamus Networks is adding these domains to the Newly Registered Domain (NRD) threat intelligence feed.
Stamus Security Platform provides for detection and escalation of Newly Registered Domains. Those are available by default to any Stamus Customer. Access the online documentation to verify that you have this feed enabled.
If you are not a current Stamus Security Platform user, the Newly Registered Domain (NRD) threat intelligence feeds are available here. All six NRD feeds are free and optimized for SELKS and Suricata 7 users. To learn more about NRD threat intelligence, read our blog post "Introducing Open NRD: Newly Registered Domain Threat Intel Feeds for Suricata".
Please find below examples of the recently registered suspicious (mostly with malicious intent) CrowdStrike-related domains:
crowdstrike24[. ]site
crowdstrike24[. ]online
thecrowdstrike[. ]com
thecrowdstrike[. ]com
thecrowdstrike[. ]com
crowdstrike[. ]blue
crowdstrike[. ]bot
crowdstrike[. ]cam
crowdstrike[. ]fail
crowdstrike[. ]help
crowdstrikeoutage[. ]info
crowdstrikedown[. ]site
crowdstrikereport[. ]com
crowdstrike-bluescreen[. ]com
crowdstrike-helpdesk[. ]com
crowdstrike-out[. ]com
crowdstrike0day[. ]com
crowdstrikebluescreen[. ]com
crowdstrikebsod[. ]com
crowdstrikebug[. ]com
crowdstrikeclaim[. ]com
crowdstrikeclaims[. ]com
crowdstrikeclassaction[. ]com
crowdstrikedoomsday[. ]com
crowdstrikedown[. ]com
crowdstrikefail[. ]com
crowdstrikefixer[. ]com
crowdstrikeglitch[. ]com
crowdstrikelawsuit[. ]com
crowdstrikeold[. ]com
crowdstrikeoops[. ]com
crowdstrikeoopsie[. ]com
crowdstrikeout[. ]com
crowdstrikeoutage[. ]com
crowdstrikerecovery[. ]com
crowdstrikesucks[. ]com
crowdstrikesuporte[. ]com
crowdstriketoken[. ]com
crowdstrikeupdate[. ]com
crowdstrikewindowsoutage[. ]com
crowdstrikezeroday[. ]com
fix-crowdstrike[. ]com
fuckcrowdstrike[. ]com
fuckingcrowdstrike[. ]com
iscrowdstrikedown[. ]com
isitcrowdstrike[. ]com
microsoftcrowdstrike[. ]com
suportecrowdstrike[. ]com
whatiscrowdstrike[. ]com
crowdstrike[. ]feedback
crowdstrikehelp[. ]info
crowdstrikeplatform[. ]info
crowdstrikesupport[. ]info
crowdstrikerescue[. ]org
crowdstrikeyou[. ]xyz
crowdstrike-fix[. ]zip
crowdstrikefix[. ]zip
Please follow the steps listed below in the Stamus Security Platform (SSP) “Hunt” interface.
NOTE: Portions of this are not applicable to the Stamus Probe Management license tier.
To create a filter:
Domain in FQDN breakdown for HTTP, TLS and DNS ( Dashboard tab).
NOTE: some items described here are not applicable to Stamus Probe Management license tier
The resulting filter can be saved by simply clicking on the “Save” link on the right-hand side of the “Active filter”. Check “Shared” in the resulting dialog box if you want to make the filter available to all users.
The newly created filter is now available in “Global Filter Sets” or “Private Filter Sets”
NOTE: Portions are not applicable to Stamus ND or Stamus Probe Management license tiers.
If needed, an automated escalation to a Declaration of Compromise (DoC) and webhooks is also possible, including from historical data.
For example, if it happened 24hrs or 7 days ago it will still be detected and escalated based on that custom filter.
To do so:
The screenshot below shows the DoC event creation form:
Auto Tagging all relevant events is also an option. This will allow for any logs (alerts or protocol transaction events related to the alerts) to have a “Relevant” tag inserted in the JSON logs:
To do so:
All data generated by Stamus ND/NDR, such as alerts, protocol transactions, sightings events or HostID information, may be exported and shared with any SIEM or SOAR system.
Over 4000 fields are available -- from domain requests, http user agents used, hostnames, usernames logged in -- to encrypted analysis including JA3/JA4/JA3S fingerprinting, TLS certificates and more.
Any query of the Stamus Networks data (protocol transaction or alert logs) can be exported via a regular JSON log query or visualization export.
To export CSV data from any info of the alerts you can open the SN-ALERT dashboard in Kibana, type in the filter:
“alert.signature.keyword:*NRD* AND hostname_info.domain:*crowdstrike*”
then you can export a CSV of any visualization using “Inspect” (see example below):
Click on “Inspect” in any visualization to export a CSV
NOTE: portions of this section are not applicable to Stamus Probe Management.
Any query of the Stamus Networks data (protocol transaction or alert logs a like) in Splunk can be exported via a regular Splunk query or visualization export.
event_type=alert "alert.signature"="*NRD*" "hostname_info.domain"="*crowdstrike*"
Stamus Networks provides a free Splunk app https://splunkbase.splunk.com/app/5262 that can be used to do specific searches.
If there are any Splunk visualizations queries that have supporting information for the query that needs to be exported, it can be done so by the native Splunk export functionality.
Please feel free to reach out to support@stamus-networks.com with any questions or feedback.
To stay updated with new blog posts from Stamus Networks, also make sure to subscribe to the Stamus Networks blog, follow us on Twitter, LinkedIn, and Facebook, or join our Discord.