{
	"id": "69162cab-64db-4077-a9f6-cef4140e1f05",
	"created_at": "2026-04-06T00:12:34.344314Z",
	"updated_at": "2026-04-10T13:11:46.574199Z",
	"deleted_at": null,
	"sha1_hash": "4cf0a748355a78af21ed1297860a7982648b3f3d",
	"title": "Blue Screen Mayhem: When CrowdStrike's Glitch Became Threat Actor's Playground",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 898481,
	"plain_text": "Blue Screen Mayhem: When CrowdStrike's Glitch Became Threat\r\nActor's Playground\r\nBy Loginsoft\r\nPublished: 2026-02-20 · Archived: 2026-04-05 18:42:12 UTC\r\nIntroduction\r\nA polymorphic Malware designed to evade detection while stealing sensitive information from infected systems.\r\nSimilar in behavior and intent to WASP Stealer, Discock Stealer leverages obfuscation and frequent code changes\r\nto bypass signature-based defenses. The article focuses on its behavior, delivery mechanisms, and why such\r\npolymorphic stealers pose a growing challenge for modern security detection.\r\nKey Takeaways  \r\nBlue Screen Mayhem caused widespread system instability across Windows environments.\r\nCrowdStrike’s Glitch created security blind spots during outage and recovery phases.\r\nBlue Screen of Death (BSOD) incidents weakened defenses, increasing attacker opportunities.\r\nOperational failures can amplify threat actor activity if not managed securely\r\nIn the ever-evolving landscape of cybersecurity, even the smallest hiccup can create ripples that turn into\r\ntsunamis. The recent Blue Screen of Death (BSOD) outage at Microsoft, caused by a compatibility issue with\r\nCrowdStrike, was just such an event. But as we've learned time and time again, where there's chaos, there are\r\nopportunists waiting to pounce.\r\nAs if managing a major outage wasn't challenging enough, three separate malware campaigns surfaced, exploiting\r\nthis catastrophe through phishing websites and emails. Apart from these, various CrowdStrike domains have been\r\ncreated for malicious intent; a list of a few domains can be found in the end section.\r\nhttps://www.loginsoft.com/post/blue-screen-mayhem-when-crowdstrikes-glitch-became-threat-actors-playground\r\nPage 1 of 5\n\nFigure: Overview of Campaigns Taking Advantage of Microsoft CrowdStrike Outage\r\nCampaign 1: Fake Updates with RemCos RAT\r\nOne concerning strategy involved the distribution of misleading updates. Threat actors circulated ZIP files named\r\n\"crowdstrike-hotfix.zip,\" ostensibly offering a solution to the BSOD problem. However, these files actually\r\ncontained the RemCos Remote Access Trojan (RAT), which enables unauthorized remote access to affected\r\nsystems, potentially leading to data breaches.\r\nIn one instance, a phishing website impersonating BBVA bank was used to distribute this malicious ZIP file.\r\nWhen downloaded and run, the file activated HijackLoader, which subsequently installed the RemCos RAT. This\r\ncase demonstrates how attackers took advantage of the situation to compromise systems by posing as providers of\r\ncrucial updates.\r\nFor intel on the RemCos RAT and HijackLoader, visit Loginsoft's threat profiles: \r\nRemCos RAT \r\nHijackLoader\r\nCampaign 2: Daolpu Stealer via Fake Microsoft Recovery Manual\r\nThe threat actors behind the Daolpu Stealer delivered the malware via a Word document containing a malicious\r\nmacro, disguised as a recovery manual. Once the Daolpu Stealer was executed, the following behavior was\r\nobserved:\r\nTermination of the Chrome process.\r\nCollection of credentials from Chrome and Mozilla browsers.\r\nhttps://www.loginsoft.com/post/blue-screen-mayhem-when-crowdstrikes-glitch-became-threat-actors-playground\r\nPage 2 of 5\n\nExfiltration of data to the command-and-control (C2) server.\r\nSample: Triage\r\nFor more information about the Daolpu Stealer, visit: Daolpu Malware Campaign\r\nCampaign 3: The Handala Hacking Hullabaloo\r\nThe Handala hacking group utilized the outage to further their political agenda. They claimed to have conducted a\r\nwiper malware attack targeting Israeli organizations, disguising it as a CrowdStrike update. This malware was\r\ndesigned to not only disrupt systems but also to permanently delete data, potentially causing significant damage.\r\nThis incident illustrates how certain groups may exploit widespread technical issues to carry out targeted attacks,\r\ncombining cybersecurity threats with political motivations.\r\nThreat Bites\r\nThreat Actors TA544, APT33, Handala\r\nMalwares HijackLoader, Remcos RAT, Daolpu Stealer\r\nTargeted Country/Region Latin America, Israel\r\nTargeted Industry Banks\r\nFirst Seen July 2024\r\nLast Seen July 2024\r\nLOLBAS Certutil.exe, Schtasks.exe\r\nTelemetry Sysmon, Security, PowerShell\r\nMalicious Domains:\r\ncrowdstrike-bsod[.]co\r\ncrowdstrike-bsod[.]com\r\ncrowdstrike-fix[.]zip\r\ncrowdstrike-helpdesk[.]com\r\ncrowdstrike-out[.]com\r\ncrowdstrike[.]blue\r\ncrowdstrike[.]bot\r\ncrowdstrike[.]cam\r\ncrowdstrike[.]ee\r\ncrowdstrike[.]es\r\nhttps://www.loginsoft.com/post/blue-screen-mayhem-when-crowdstrikes-glitch-became-threat-actors-playground\r\nPage 3 of 5\n\ncrowdstrike[.]fail\r\ncrowdstrike0day[.]com\r\ncrowdstrikebluescreen[.]com\r\ncrowdstrikebsod[.]co\r\ncrowdstrikebsod[.]com\r\ncrowdstrikebug[.]com\r\ncrowdstrikeclaim[.]com\r\ncrowdstrikeclaims[.]com\r\nConclusion\r\nThe blog highlights that Blue Screen Mayhem was not just an availability issue but a security concern amplified\r\nby scale and timing. CrowdStrike’s Glitch demonstrated how outages can disrupt defensive controls and open\r\nwindows of opportunity for attackers, especially during emergency response and remediation. The incident\r\nreinforces the need for resilient security architectures, controlled recovery processes, and contingency planning\r\nthat accounts for both operational and adversarial risks during major system failures.\r\nFAQs\r\nQ1. What is meant by Blue Screen Mayhem?\r\nBlue Screen Mayhem is an informal phrase used to describe large-scale disruption caused when many systems\r\nsimultaneously crash with the Blue Screen of Death (BSOD). The term became widely used after the global IT\r\noutage in July 2024, when a faulty update from CrowdStrike triggered BSODs on millions of Windows devices\r\nworldwide. The “mayhem” reflects the massive impact disrupting airlines, banks, hospitals, and businesses across\r\nthe globe due to widespread system failures.\r\nQ2. How did CrowdStrike’s glitch become a security risk?\r\nCrowdStrike’s 2024 incident became a major security risk not because of a cyberattack, but due to a flawed update\r\nin its Falcon endpoint protection software that triggered widespread Windows Blue Screen of Death (BSOD)\r\ncrashes. The outage caused massive operational disruption and financial losses, while also creating opportunities\r\nfor attackers to spread fake fixes and malware during the chaos. A simple logic error in a routine update turned a\r\ntrusted security tool into a single point of failure highlighting the critical risks of vendor dependency and\r\ninsufficient update validation.\r\nQ3. Why are BSOD incidents dangerous beyond downtime?\r\nBeyond immediate downtime, Blue Screen of Death (BSOD) incidents are dangerous because they can cause data\r\ncorruption or loss, signal deeper problems like malware infections or hardware failures, and trigger cascading\r\noperational outages across large organizations.\r\nQ4. How can outages become a threat actor’s playground?\r\nOutages create a “playground” for attackers by causing chaos, distraction, and urgency. During these moments,\r\nsecurity best practices are often overlooked, exposing new vulnerabilities and making organizations and users\r\nhttps://www.loginsoft.com/post/blue-screen-mayhem-when-crowdstrikes-glitch-became-threat-actors-playground\r\nPage 4 of 5\n\nmore vulnerable to opportunistic attacks.\r\nSource: https://www.loginsoft.com/post/blue-screen-mayhem-when-crowdstrikes-glitch-became-threat-actors-playground\r\nhttps://www.loginsoft.com/post/blue-screen-mayhem-when-crowdstrikes-glitch-became-threat-actors-playground\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.loginsoft.com/post/blue-screen-mayhem-when-crowdstrikes-glitch-became-threat-actors-playground"
	],
	"report_names": [
		"blue-screen-mayhem-when-crowdstrikes-glitch-became-threat-actors-playground"
	],
	"threat_actors": [
		{
			"id": "a63c994f-d7d6-4850-a881-730635798b90",
			"created_at": "2025-08-07T02:03:24.788883Z",
			"updated_at": "2026-04-10T02:00:03.785146Z",
			"deleted_at": null,
			"main_name": "COBALT TRINITY",
			"aliases": [
				"APT33 ",
				"Elfin ",
				"HOLMIUM ",
				"MAGNALIUM ",
				"Peach Sandstorm ",
				"Refined Kitten ",
				"TA451 "
			],
			"source_name": "Secureworks:COBALT TRINITY",
			"tools": [
				"AutoCore",
				"Cadlotcorg",
				"Dello RAT",
				"FalseFont",
				"Imminent Monitor",
				"KDALogger",
				"Koadic",
				"NanoCore",
				"NetWire",
				"POWERTON",
				"PoshC2",
				"Poylog",
				"PupyRAT",
				"Schoolbag"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "c91f7778-69aa-45fa-be0e-4ee33daf8fbd",
			"created_at": "2023-01-06T13:46:39.110148Z",
			"updated_at": "2026-04-10T02:00:03.216613Z",
			"deleted_at": null,
			"main_name": "NARWHAL SPIDER",
			"aliases": [
				"GOLD ESSEX",
				"TA544",
				"Storm-0302"
			],
			"source_name": "MISPGALAXY:NARWHAL SPIDER",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "4134675e-5b72-4b50-8d70-1a8f18aafbb4",
			"created_at": "2024-10-04T02:00:04.766263Z",
			"updated_at": "2026-04-10T02:00:03.715945Z",
			"deleted_at": null,
			"main_name": "Handala",
			"aliases": [],
			"source_name": "MISPGALAXY:Handala",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "e5ff825b-0456-4013-b90a-971b93def74a",
			"created_at": "2022-10-25T15:50:23.824058Z",
			"updated_at": "2026-04-10T02:00:05.377261Z",
			"deleted_at": null,
			"main_name": "APT33",
			"aliases": [
				"APT33",
				"HOLMIUM",
				"Elfin",
				"Peach Sandstorm"
			],
			"source_name": "MITRE:APT33",
			"tools": [
				"PowerSploit",
				"AutoIt backdoor",
				"PoshC2",
				"Mimikatz",
				"NanoCore",
				"DEADWOOD",
				"StoneDrill",
				"POWERTON",
				"LaZagne",
				"TURNEDUP",
				"NETWIRE",
				"Pupy",
				"ftp"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "956fc691-b6c6-4b09-b69d-8f007c189839",
			"created_at": "2025-08-07T02:03:24.860251Z",
			"updated_at": "2026-04-10T02:00:03.656547Z",
			"deleted_at": null,
			"main_name": "GOLD ESSEX",
			"aliases": [
				"Narwhal Spider ",
				"Storm-0302 ",
				"TA544 "
			],
			"source_name": "Secureworks:GOLD ESSEX",
			"tools": [
				"Cutwail",
				"Pony",
				"Pushdo"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "b23e717c-0b27-47e0-b3c8-4defe6dd857f",
			"created_at": "2023-01-06T13:46:38.367369Z",
			"updated_at": "2026-04-10T02:00:02.945356Z",
			"deleted_at": null,
			"main_name": "APT33",
			"aliases": [
				"Elfin",
				"MAGNALLIUM",
				"HOLMIUM",
				"COBALT TRINITY",
				"G0064",
				"ATK35",
				"Peach Sandstorm",
				"TA451",
				"APT 33",
				"Refined Kitten"
			],
			"source_name": "MISPGALAXY:APT33",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "1f679d2e-c5c9-49e9-b854-2eca06a870e4",
			"created_at": "2022-10-25T16:07:24.453427Z",
			"updated_at": "2026-04-10T02:00:04.997515Z",
			"deleted_at": null,
			"main_name": "Bamboo Spider",
			"aliases": [
				"Bamboo Spider",
				"TA544"
			],
			"source_name": "ETDA:Bamboo Spider",
			"tools": [
				"AndroKINS",
				"Bebloh",
				"Chthonic",
				"DELoader",
				"Dofoil",
				"GozNym",
				"Gozi ISFB",
				"ISFB",
				"Nymaim",
				"PandaBanker",
				"Pandemyia",
				"Sharik",
				"Shiotob",
				"Smoke Loader",
				"SmokeLoader",
				"Terdot",
				"URLZone",
				"XSphinx",
				"ZLoader",
				"Zeus OpenSSL",
				"Zeus Panda",
				"Zeus Sphinx",
				"ZeusPanda",
				"nymain"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434354,
	"ts_updated_at": 1775826706,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/4cf0a748355a78af21ed1297860a7982648b3f3d.pdf",
		"text": "https://archive.orkl.eu/4cf0a748355a78af21ed1297860a7982648b3f3d.txt",
		"img": "https://archive.orkl.eu/4cf0a748355a78af21ed1297860a7982648b3f3d.jpg"
	}
}