(Hong Kong, 24 July 2024) Regarding the CrowdStrike software update failure incident on 19 July 2024, Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) found reports that criminals continue to evolve their attack tactics. Those include using fake CrowdStrike recovery manuals, fake remediation solutions and fake software updates to deliver unidentified malware, which could lead to sensitive data leakage, system crashes, and data loss.
According to related information, HKCERT has observed the following attack tactics to spread malware that are taking advantage of this incident.
Fake recovery manual
Fake remediation solutions
Fake CrowdStrike update
HKCERT urges the public to be vigilant against the malware attacks and recommends that users should:
If the public encounter a malware attack, HKCERT recommends that users should:
To learn more about the security advisory of CrowdStrike denial of service alert, please visit the HKCERT website for the latest news:
https://www.hkcert.org/tc/security-bulletin/crowdstrike-denial-of-service-vulnerability_20240719
Businesses or members of the public who wish to report to HKCERT on cyber security related incidents can do so by completing the online form at: https://www.hkcert.org/zh/incident-reporting or call the 24-hour hotline at 8105 6060. For further enquiries, please contact HKCERT at hkcert@hkcert.org.
- Ends -
Share the latest information of HKPC to your inbox
Our Services
Support & Resource
HKPC Spotlights
COPYRIGHT© Hong Kong Productivity Council