Russian cybercriminals attempt to hack CrowdStrike network

Russian cybercriminals attempt to hack CrowdStrike network

Suspected Russian hackers tried installing a malware in the company network but failed to access emails

In a recent turn of events, California-headquartered cyber-security firm- CrowdStrike- has announced that suspected Russian hackers, who have been infamous for breaking into a series of US government agencies via compromising SolarWinds software, have tried attacking its network over a couple of times but failed to do so.

It would be essential to note that CrowdStrike is not the first company to be targeted by the hackers; as at least 24 top-notch companies such as Cisco, Intel, Nvidia, and others suffered part of the SolarWinds hack scored by such cybercriminals.

It has been reported that the suspected Russian hackers installed some sort of a malware in Orion software sold by SolarWinds, and accessed crucial information belonging to several US government enterprises and agencies, at least a university and one hospital.

In fact, as per sources close to CrowdStrike, it was claimed that the company was notified by Microsoft that the hackers had tried to get through the emails via a Microsoft reseller’s account quite a long back. However, the attempt to read emails failed as the company does not make use of Microsoft Office 365 email.

According to officials, they recognized a reseller’s Microsoft Azure account for managing CrowdStrike’s Office licenses making anomalous calls to Microsoft cloud APIs several months back. Post this, the company conducted a comprehensive review and found that it has suffered no impact from hacking.

Having said that, Russia has reportedly denied having a role in the hacking operations across all the 24 IT companies and government agencies.

Earlier, in a similar incidence, US-based cybersecurity organization- FireEye – had admitted being a part of massive SolarWinds attack. The hackers group, superficially known as Cozy Bear, or APT29, has been alleged to be behind the attack on FireEye, taking access of its internal network and stealing tools the company uses to test networks belonging to its clients.

Source Credit: