CrowdStrike has confirmed that an employee shared images of his desk with a group of cybercriminals, who used them to falsely allege a breach. Although the company's systems were not breached, this incident highlights the threat posed by insiders and the need to strengthen access management and internal oversight.

What has happened?

An employee or collaborator with access to CrowdStrike's internal environment shared images of their desktop with cybercriminals, including internal control panels and links to the company's access console (SSO). Later, the cybercriminal group calling itself Scattered Lapsus$ Hunters published these captures on a public channel, falsely claiming that they had compromised CrowdStrike's systems through a vulnerability in an external vendor.

CrowdStrike reacted immediately: it revoked the worker's access, described the incident as an internal threat and assured that its systems had not been breached and that its customers' data remained secure. In addition, the company has placed the case in the hands of the competent authorities for investigation.

Risks and implications of the incident

Although there was no technical attack or vulnerability exploitation, the incident demonstrates that:

  • An insider with legitimate access can pose a critical risk, especially with privileged knowledge or credentials.
  • The dissemination of manipulated evidence (screenshots, captures, false logs) can generate fear, distrust and confusion about the real security of the company.
  • Even cybersecurity companies can suffer an erosion of trust if they don't properly manage their internal risks.
  • Internal threats require monitoring, ongoing auditing, and a culture of internal security, beyond traditional technical controls.

Lessons and Preventing Insider Threats

This incident underscores that internal threats can be just as dangerous as external attacks. Legitimate access to critical systems allows a malicious or careless employee to compromise sensitive information without the need to violate the infrastructure.

To mitigate this risk, companies must implement privileged access management policies, segment and monitor user permissions, and establish cybersecurity awareness and ongoing training programs. In addition, having clear auditing and response protocols to internal incidents allows suspicious behavior to be detected before it escalates, protecting both systems and the organization's reputation.

The combination of technical controls, active surveillance and internal security culture is key to protecting systems and maintaining the trust of customers and strategic partners.

What we recommend from Apolo Cybersecurity

The CrowdStrike case reinforces a key lesson: security doesn't just depend on systems or firewalls, but on the people with access to them. That's why:

  • Implement internal threat management programs (“insider threat”) with access control, privileged activity monitoring and regular reviews.
  • Apply Zero Trust policies, segmenting access and auditing permissions on a routine basis.
  • Proactively verify the integrity of systems and logs, including logs and change reviews.
  • Communicate transparently with customers and users about any incident, explaining scope and corrective measures.

Strengthen your defense from within

Don't wait for a third party or an insider to put your reputation at risk. At Apolo Cybersecurity, we help you audit internal access, implement continuous monitoring and train your teams to anticipate risks. True security starts on the inside — make sure you have it.

Prev Post
Next Post

Any questions?
We're happy to help!