Accelerated by:


Copyright © 2025 Apollo Cybersecurity

.webp)
CrowdStrike has confirmed that an employee shared images of his desk with a group of cybercriminals, who used them to falsely allege a breach. Although the company's systems were not breached, this incident highlights the threat posed by insiders and the need to strengthen access management and internal oversight.
An employee or collaborator with access to CrowdStrike's internal environment shared images of their desktop with cybercriminals, including internal control panels and links to the company's access console (SSO). Later, the cybercriminal group calling itself Scattered Lapsus$ Hunters published these captures on a public channel, falsely claiming that they had compromised CrowdStrike's systems through a vulnerability in an external vendor.
CrowdStrike reacted immediately: it revoked the worker's access, described the incident as an internal threat and assured that its systems had not been breached and that its customers' data remained secure. In addition, the company has placed the case in the hands of the competent authorities for investigation.
Although there was no technical attack or vulnerability exploitation, the incident demonstrates that:
This incident underscores that internal threats can be just as dangerous as external attacks. Legitimate access to critical systems allows a malicious or careless employee to compromise sensitive information without the need to violate the infrastructure.
To mitigate this risk, companies must implement privileged access management policies, segment and monitor user permissions, and establish cybersecurity awareness and ongoing training programs. In addition, having clear auditing and response protocols to internal incidents allows suspicious behavior to be detected before it escalates, protecting both systems and the organization's reputation.
The combination of technical controls, active surveillance and internal security culture is key to protecting systems and maintaining the trust of customers and strategic partners.
The CrowdStrike case reinforces a key lesson: security doesn't just depend on systems or firewalls, but on the people with access to them. That's why:
Don't wait for a third party or an insider to put your reputation at risk. At Apolo Cybersecurity, we help you audit internal access, implement continuous monitoring and train your teams to anticipate risks. True security starts on the inside — make sure you have it.
.webp)