Skip to main content
  1. Home
  2. Computing
  3. News

Firms hit by huge IT outage warned to be wary of scammers

Add as a preferred source on Google
A digital depiction of a laptop being hacked by a hacker.
Digital Trends

As if firms hit by the recent massive IT outage don’t already have enough to deal with, they’re now being warned to be wary of scammers and hackers looking to take advantage of the situation.

The global incident kicked off when an update for Windows hosts that contained an error was rolled out by Texas-based cybersecurity firm CrowdStrike. The ensuing chaos impacted important services around the world, with sectors such as travel, banking, retail, and health care all suffering major disruption late Thursday and into Friday.

Recommended Videos

In a blog post on Friday, CrowdStrike CEO George Kurtz warned that “adversaries and bad actors will try to exploit events like this.”

Kurtz continued: “I encourage everyone to remain vigilant and ensure that you’re engaging with official CrowdStrike representatives. Our blog and technical support will continue to be the official channels for the latest updates.”

The following day, CrowdStrike revealed that threat actors were attempting to leverage the event to distribute a malicious ZIP archive named crowdstrike-hotfix.zip. The ZIP archive contains a HijackLoader payload that, when executed, loads Remcos, which grants an attacker control of an infected computer.

In a follow-up post on Sunday, the company again warned that customers should “verify they are communicating with CrowdStrike representatives through official channels.”

America’s Cybersecurity and Infrastructure Security Agency (CISA) commented on Sunday that “cyberthreat actors continue to leverage the outage to conduct malicious activity, including phishing attempts.” The agency is continuing to work closely with CrowdStrike and other private sector and government partners to actively monitor any emerging malicious activity, it said.

It’s also possible that, because the IT outage was so huge and gained such widespread coverage, even computer users who have nothing to do with CrowdStrike could be tricked into believing they need to install an “essential update” to ensure their PC doesn’t experience any issues going forward. With that in mind, now is the time to be extra vigilant when dealing with emails and messages, especially if they’re trying to get you to download something or click on a link.

Trevor Mogg
Contributing Editor
Not so many moons ago, Trevor moved from one tea-loving island nation that drives on the left (Britain) to another (Japan)…
The Mac Pro is dead at Apple, and I’ll miss the cheese-grater powerhouse
RIP Mac Pro. The Mac Studio is taking the throne, and we're okay with that.
Electronics, Computer, Pc

Apple has officially discontinued the Mac Pro. It’s been removed from Apple’s website, and Apple has confirmed to 9to5Mac that there are no plans to release a future version. The buy page now redirects to Apple’s Mac homepage, where the Mac Pro no longer exists.

Why did Apple kill the Mac Pro?

Read more
March Madness, Revisited: The AI Model Did Well. But Mad Things Still Happen
Stills from NCAA games.

(NOTE: This article is part of an ongoing series documenting an experiment with using AI to fill the NCAA brackets and see how it fares against years of human experience. The original article is as follows.)

A week ago, I wrote about entering an NCAA tournament pool with a more disciplined process than I usually use.

Read more
A simple coding mistake is exposing API keys across thousands of websites
Security gaps that are easier to miss than you think
Computer, Electronics, Laptop

After analyzing 10 million webpages, researchers have found thousands of websites accidentally exposing sensitive API credentials, including keys linked to major services like Amazon Web Services, Stripe, and OpenAI.

This is a serious issue because APIs act as the backbone of the apps we use today. They allow websites to connect to services like payments, cloud storage, and AI tools, but they rely on digital keys to stay secure. Once exposed, API keys can allow anyone to interact with those services with malicious intent.

Read more