Don't Open Any CrowdStrike Repair Emails; They're All Fakes


Whenever something big happens in the technology world, scammers are not far behind. The 2024 CrowdStrike outage is no different, and while the issues have been mostly sorted out, scammers are hot on its heels, peddling their latest tricks.

So, here's what's going on with the CrowdStrike repair email and why you should ignore it.


CrowdStrike is a global cybersecurity company whose clients include some of the world's biggest companies. Companies that can't risk data loss or having their systems compromised usually invest in something a little beefier than the Windows antivirus apps that you and I use on our personal computers, which is where expert organizations like CrowdStrike are required.

CrowdStrike is one of the more popular options for businesses, offering defense against hackers trying to gain access to vital systems, endpoint security, threat intelligence, and cyberattack response services. Given that the loss of these vital systems could cost companies millions of dollars at best or human lives at worst, companies need the best security they can get.

The CrowdStrike outage happened when the security firm pushed a bad update to companies worldwide. This update caused Windows computers to suffer a Bluescreen of Death loop when they booted up and rendered the affected systems unusable. This caused chaos worldwide, from canceled flights to important hospital software going offline. Furthering the issue, most affected computers needed to be reset and rebooted manually, adding millions of hours of downtime to vital systems.

What Is the CrowdStrike Repair Email?

As you might imagine, the CrowdStrike bug caused companies to panic. Many were looking for solutions from either Microsoft or CrowdStrike, both of which eventually published updates and tools to help PCs get back on track. Unfortunately, where there's widespread panic, scammers aren't far behind.

CrowdStrike identified a scam making the rounds that uses the latest outage as part of its bait. As described on the CrowdStrike blog, scammers took a copy of Microsoft's advice on how to fix a computer affected by CrowdStrike. They then pasted it into a Word document and added a Word macro designed to download the Daolpu malware onto the target PC. They then email the infected Word document to people in hopes of getting a catch.

When someone receives the email with the infected Word document, they download it to learn how to fix the CrowdStrike bluescreen error. If they enable Word macros, the Daolpu malware downloads onto the victim's PC. From here, Daolpu steals cookies and login details from the victim's browser and sends them back to the scammer.

Previous Post Next Post