The post CrowdStrike fires an insider accused of sharing internal screen images appeared on BitcoinEthereumNews.com. Texas-based American cybersecurity firm CrowdStrike has reportedly fired an employee accused of leaking internal information to a cybercrime collective that has recently claimed responsibility for corporate breaches involving Salesforce-connected systems.  The security firm dismissed the “insider” after it found that they worked with the group known as Scattered Lapsus$ Hunters, who began publishing alleged internal screenshots late Thursday and Friday morning on its Telegram channel. Scattered Lapsus$ released several images showing dashboards linked to company resources, including Okta panels used by employees to access internal applications. The hackers claimed the screenshots came from the compromised employee and were evidence that they had successfully infiltrated CrowdStrike after hacking Gainsight earlier this week. CrowdStrike and Gainsight still investigating stolen information According to CrowdStrike, the assertions from the hacking group and the images on Telegram only belonged to an employee who had shared unauthorized photos of his screen with external parties, and it insists there were no breaches on its systems.  “Our systems were never compromised and customers remained protected throughout,”  spokesperson Kevin Benacci told news publication TechCrunch. He added that the company “turned the case over to relevant law enforcement agencies” after terminating the insider’s access. CrowdStrike claimed it packed the desk of the worker as soon as it was confirmed he “shared pictures of his computer screen externally,” and the claims circulating in hacker channels were “false.” Salesforce confirms breach of customer data On Friday morning, Salesforce updated its incident page saying a breach was affecting some of its customers by causing “connection failures.” Unauthorized actors had accessed “certain customers’ Salesforce data,” though it did not identify which organizations were affected.  Salesforce said the intrusion occurred through applications developed by customer support and analytics service provider Gainsight. Later in the day, Google’s Threat Intelligence Group’s Austin Larsen, a principal threat analyst… The post CrowdStrike fires an insider accused of sharing internal screen images appeared on BitcoinEthereumNews.com. Texas-based American cybersecurity firm CrowdStrike has reportedly fired an employee accused of leaking internal information to a cybercrime collective that has recently claimed responsibility for corporate breaches involving Salesforce-connected systems.  The security firm dismissed the “insider” after it found that they worked with the group known as Scattered Lapsus$ Hunters, who began publishing alleged internal screenshots late Thursday and Friday morning on its Telegram channel. Scattered Lapsus$ released several images showing dashboards linked to company resources, including Okta panels used by employees to access internal applications. The hackers claimed the screenshots came from the compromised employee and were evidence that they had successfully infiltrated CrowdStrike after hacking Gainsight earlier this week. CrowdStrike and Gainsight still investigating stolen information According to CrowdStrike, the assertions from the hacking group and the images on Telegram only belonged to an employee who had shared unauthorized photos of his screen with external parties, and it insists there were no breaches on its systems.  “Our systems were never compromised and customers remained protected throughout,”  spokesperson Kevin Benacci told news publication TechCrunch. He added that the company “turned the case over to relevant law enforcement agencies” after terminating the insider’s access. CrowdStrike claimed it packed the desk of the worker as soon as it was confirmed he “shared pictures of his computer screen externally,” and the claims circulating in hacker channels were “false.” Salesforce confirms breach of customer data On Friday morning, Salesforce updated its incident page saying a breach was affecting some of its customers by causing “connection failures.” Unauthorized actors had accessed “certain customers’ Salesforce data,” though it did not identify which organizations were affected.  Salesforce said the intrusion occurred through applications developed by customer support and analytics service provider Gainsight. Later in the day, Google’s Threat Intelligence Group’s Austin Larsen, a principal threat analyst…

CrowdStrike fires an insider accused of sharing internal screen images

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Texas-based American cybersecurity firm CrowdStrike has reportedly fired an employee accused of leaking internal information to a cybercrime collective that has recently claimed responsibility for corporate breaches involving Salesforce-connected systems. 

The security firm dismissed the “insider” after it found that they worked with the group known as Scattered Lapsus$ Hunters, who began publishing alleged internal screenshots late Thursday and Friday morning on its Telegram channel.

Scattered Lapsus$ released several images showing dashboards linked to company resources, including Okta panels used by employees to access internal applications. The hackers claimed the screenshots came from the compromised employee and were evidence that they had successfully infiltrated CrowdStrike after hacking Gainsight earlier this week.

CrowdStrike and Gainsight still investigating stolen information

According to CrowdStrike, the assertions from the hacking group and the images on Telegram only belonged to an employee who had shared unauthorized photos of his screen with external parties, and it insists there were no breaches on its systems. 

“Our systems were never compromised and customers remained protected throughout,”  spokesperson Kevin Benacci told news publication TechCrunch. He added that the company “turned the case over to relevant law enforcement agencies” after terminating the insider’s access.

CrowdStrike claimed it packed the desk of the worker as soon as it was confirmed he “shared pictures of his computer screen externally,” and the claims circulating in hacker channels were “false.”

Salesforce confirms breach of customer data

On Friday morning, Salesforce updated its incident page saying a breach was affecting some of its customers by causing “connection failures.” Unauthorized actors had accessed “certain customers’ Salesforce data,” though it did not identify which organizations were affected. 

Salesforce said the intrusion occurred through applications developed by customer support and analytics service provider Gainsight.

Later in the day, Google’s Threat Intelligence Group’s Austin Larsen, a principal threat analyst at its cybersecurity division, said the company “is aware of more than 200 potentially affected Salesforce instances.” 

Scattered Lapsus$ Hunters publicly claimed responsibility for accessing data through Gainsight’s integrations and used stolen information to target other corporate customers.

A spokesperson for ShinyHunters, one of the groups within the collective, boasted that “Gainsight was a customer of Salesloft Drift, they were affected and therefore compromised entirely by us.” 

Gainsight has been issuing updates on its incident page since the attack became public. On Friday, the company said it had engaged Mandiant, Google’s incident response unit, to help investigate the breach. 

Salesforce also temporarily revoked active access tokens for Gainsight-connected apps as a precautionary measure, alongside notifying customers whose data was stolen, according to the firm’s public updates. 

“Customers using Hubspot might find that the Gainsight app has been temporarily pulled from the Hubspot Marketplace as a precautionary measure. This may also impact OAuth access for customer connections while the review is taking place. We will work with Hubspot on re-listing after thorough review,” noted one progress report published on Thursday.

Scattered Lapsus$ family is responsible for several high-profile breaches

Scattered Lapsus$ Hunters is a collaboration formed by several English-speaking cybercrime groups, including ShinyHunters, Scattered Spider, and Lapsus$. The collective became popular for using social engineering techniques to trick employees into revealing login details, granting remote access, or approving authentication prompts. 

In their list of “conquests,” the group has previously targeted MGM Resorts, Coinbase, DoorDash, Workday, Aflac Insurance, and other large companies. Back in October, Scattered Lapsus$ Hunters claimed to have stolen more than one billion records from enterprises using Salesforce to manage customer information. 

They published a leaked directory listing data from insurance provider Allianz Life, airline Qantas, carmaker Stellantis, TransUnion, employee management platform Workday, and more.

Over the last year and a half, the Scattered Lapsus$ family has also claimed responsibility for incidents on Atlassian, DocuSign, F5, GitLab, LinkedIn, Malwarebytes, SonicWall, Thomson Reuters, and Verizon. 

The hackers said on their Telegram channel that they plan to launch a new extortion website next week for the companies hit in their latest operation. 

“The next data leak site will contain the data of the Salesloft and GainSight campaigns,” the hackers shared their plans with DataBreaches.net.

Sharpen your strategy with mentorship + daily ideas – 30 days free access to our trading program

Source: https://www.cryptopolitan.com/crowdstrike-fires-insider-hackers/

Market Opportunity
SOON Logo
SOON Price(SOON)
$0.1288
$0.1288$0.1288
-4.02%
USD
SOON (SOON) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Pi Network Price Prediction – PI Price Estimated to Drop to $0.146552 By Mar 25, 2026

Pi Network Price Prediction – PI Price Estimated to Drop to $0.146552 By Mar 25, 2026

The post Pi Network Price Prediction – PI Price Estimated to Drop to $0.146552 By Mar 25, 2026 appeared on BitcoinEthereumNews.com. Disclaimer: This is not investment
Share
BitcoinEthereumNews2026/03/21 08:10
Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

The post Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be appeared on BitcoinEthereumNews.com. Jordan Love and the Green Bay Packers are off to a 2-0 start. Getty Images The Green Bay Packers are, once again, one of the NFL’s better teams. The Cleveland Browns are, once again, one of the league’s doormats. It’s why unbeaten Green Bay (2-0) is a 8-point favorite at winless Cleveland (0-2) Sunday according to betmgm.com. The money line is also Green Bay -500. Most expect this to be a Packers’ rout, and it very well could be. But Green Bay knows taking anyone in this league for granted can prove costly. “I think if you look at their roster, the paper, who they have on that team, what they can do, they got a lot of talent and things can turn around quickly for them,” Packers safety Xavier McKinney said. “We just got to kind of keep that in mind and know we not just walking into something and they just going to lay down. That’s not what they going to do.” The Browns certainly haven’t laid down on defense. Far from. Cleveland is allowing an NFL-best 191.5 yards per game. The Browns gave up 141 yards to Cincinnati in Week 1, including just seven in the second half, but still lost, 17-16. Cleveland has given up an NFL-best 45.5 rushing yards per game and just 2.1 rushing yards per attempt. “The biggest thing is our defensive line is much, much improved over last year and I think we’ve got back to our personality,” defensive coordinator Jim Schwartz said recently. “When we play our best, our D-line leads us there as our engine.” The Browns rank third in the league in passing defense, allowing just 146.0 yards per game. Cleveland has also gone 30 straight games without allowing a 300-yard passer, the longest active streak in the NFL.…
Share
BitcoinEthereumNews2025/09/18 00:41
Bitmine has staked another 101,776 ETH, bringing its total staked amount to over 3.14 million ETH.

Bitmine has staked another 101,776 ETH, bringing its total staked amount to over 3.14 million ETH.

PANews reported on March 21 that, according to Onchain Lens monitoring, Ethereum treasury company Bitmine has staked another 101,776 ETH, worth $219.45 million.
Share
PANews2026/03/21 08:16