The post CrowdStrike fires an insider accused of sharing internal screen images appeared on BitcoinEthereumNews.com. Texas-based American cybersecurity firm CrowdStrike has reportedly fired an employee accused of leaking internal information to a cybercrime collective that has recently claimed responsibility for corporate breaches involving Salesforce-connected systems.  The security firm dismissed the “insider” after it found that they worked with the group known as Scattered Lapsus$ Hunters, who began publishing alleged internal screenshots late Thursday and Friday morning on its Telegram channel. Scattered Lapsus$ released several images showing dashboards linked to company resources, including Okta panels used by employees to access internal applications. The hackers claimed the screenshots came from the compromised employee and were evidence that they had successfully infiltrated CrowdStrike after hacking Gainsight earlier this week. CrowdStrike and Gainsight still investigating stolen information According to CrowdStrike, the assertions from the hacking group and the images on Telegram only belonged to an employee who had shared unauthorized photos of his screen with external parties, and it insists there were no breaches on its systems.  “Our systems were never compromised and customers remained protected throughout,”  spokesperson Kevin Benacci told news publication TechCrunch. He added that the company “turned the case over to relevant law enforcement agencies” after terminating the insider’s access. CrowdStrike claimed it packed the desk of the worker as soon as it was confirmed he “shared pictures of his computer screen externally,” and the claims circulating in hacker channels were “false.” Salesforce confirms breach of customer data On Friday morning, Salesforce updated its incident page saying a breach was affecting some of its customers by causing “connection failures.” Unauthorized actors had accessed “certain customers’ Salesforce data,” though it did not identify which organizations were affected.  Salesforce said the intrusion occurred through applications developed by customer support and analytics service provider Gainsight. Later in the day, Google’s Threat Intelligence Group’s Austin Larsen, a principal threat analyst… The post CrowdStrike fires an insider accused of sharing internal screen images appeared on BitcoinEthereumNews.com. Texas-based American cybersecurity firm CrowdStrike has reportedly fired an employee accused of leaking internal information to a cybercrime collective that has recently claimed responsibility for corporate breaches involving Salesforce-connected systems.  The security firm dismissed the “insider” after it found that they worked with the group known as Scattered Lapsus$ Hunters, who began publishing alleged internal screenshots late Thursday and Friday morning on its Telegram channel. Scattered Lapsus$ released several images showing dashboards linked to company resources, including Okta panels used by employees to access internal applications. The hackers claimed the screenshots came from the compromised employee and were evidence that they had successfully infiltrated CrowdStrike after hacking Gainsight earlier this week. CrowdStrike and Gainsight still investigating stolen information According to CrowdStrike, the assertions from the hacking group and the images on Telegram only belonged to an employee who had shared unauthorized photos of his screen with external parties, and it insists there were no breaches on its systems.  “Our systems were never compromised and customers remained protected throughout,”  spokesperson Kevin Benacci told news publication TechCrunch. He added that the company “turned the case over to relevant law enforcement agencies” after terminating the insider’s access. CrowdStrike claimed it packed the desk of the worker as soon as it was confirmed he “shared pictures of his computer screen externally,” and the claims circulating in hacker channels were “false.” Salesforce confirms breach of customer data On Friday morning, Salesforce updated its incident page saying a breach was affecting some of its customers by causing “connection failures.” Unauthorized actors had accessed “certain customers’ Salesforce data,” though it did not identify which organizations were affected.  Salesforce said the intrusion occurred through applications developed by customer support and analytics service provider Gainsight. Later in the day, Google’s Threat Intelligence Group’s Austin Larsen, a principal threat analyst…

CrowdStrike fires an insider accused of sharing internal screen images

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Texas-based American cybersecurity firm CrowdStrike has reportedly fired an employee accused of leaking internal information to a cybercrime collective that has recently claimed responsibility for corporate breaches involving Salesforce-connected systems. 

The security firm dismissed the “insider” after it found that they worked with the group known as Scattered Lapsus$ Hunters, who began publishing alleged internal screenshots late Thursday and Friday morning on its Telegram channel.

Scattered Lapsus$ released several images showing dashboards linked to company resources, including Okta panels used by employees to access internal applications. The hackers claimed the screenshots came from the compromised employee and were evidence that they had successfully infiltrated CrowdStrike after hacking Gainsight earlier this week.

CrowdStrike and Gainsight still investigating stolen information

According to CrowdStrike, the assertions from the hacking group and the images on Telegram only belonged to an employee who had shared unauthorized photos of his screen with external parties, and it insists there were no breaches on its systems. 

“Our systems were never compromised and customers remained protected throughout,”  spokesperson Kevin Benacci told news publication TechCrunch. He added that the company “turned the case over to relevant law enforcement agencies” after terminating the insider’s access.

CrowdStrike claimed it packed the desk of the worker as soon as it was confirmed he “shared pictures of his computer screen externally,” and the claims circulating in hacker channels were “false.”

Salesforce confirms breach of customer data

On Friday morning, Salesforce updated its incident page saying a breach was affecting some of its customers by causing “connection failures.” Unauthorized actors had accessed “certain customers’ Salesforce data,” though it did not identify which organizations were affected. 

Salesforce said the intrusion occurred through applications developed by customer support and analytics service provider Gainsight.

Later in the day, Google’s Threat Intelligence Group’s Austin Larsen, a principal threat analyst at its cybersecurity division, said the company “is aware of more than 200 potentially affected Salesforce instances.” 

Scattered Lapsus$ Hunters publicly claimed responsibility for accessing data through Gainsight’s integrations and used stolen information to target other corporate customers.

A spokesperson for ShinyHunters, one of the groups within the collective, boasted that “Gainsight was a customer of Salesloft Drift, they were affected and therefore compromised entirely by us.” 

Gainsight has been issuing updates on its incident page since the attack became public. On Friday, the company said it had engaged Mandiant, Google’s incident response unit, to help investigate the breach. 

Salesforce also temporarily revoked active access tokens for Gainsight-connected apps as a precautionary measure, alongside notifying customers whose data was stolen, according to the firm’s public updates. 

“Customers using Hubspot might find that the Gainsight app has been temporarily pulled from the Hubspot Marketplace as a precautionary measure. This may also impact OAuth access for customer connections while the review is taking place. We will work with Hubspot on re-listing after thorough review,” noted one progress report published on Thursday.

Scattered Lapsus$ family is responsible for several high-profile breaches

Scattered Lapsus$ Hunters is a collaboration formed by several English-speaking cybercrime groups, including ShinyHunters, Scattered Spider, and Lapsus$. The collective became popular for using social engineering techniques to trick employees into revealing login details, granting remote access, or approving authentication prompts. 

In their list of “conquests,” the group has previously targeted MGM Resorts, Coinbase, DoorDash, Workday, Aflac Insurance, and other large companies. Back in October, Scattered Lapsus$ Hunters claimed to have stolen more than one billion records from enterprises using Salesforce to manage customer information. 

They published a leaked directory listing data from insurance provider Allianz Life, airline Qantas, carmaker Stellantis, TransUnion, employee management platform Workday, and more.

Over the last year and a half, the Scattered Lapsus$ family has also claimed responsibility for incidents on Atlassian, DocuSign, F5, GitLab, LinkedIn, Malwarebytes, SonicWall, Thomson Reuters, and Verizon. 

The hackers said on their Telegram channel that they plan to launch a new extortion website next week for the companies hit in their latest operation. 

“The next data leak site will contain the data of the Salesloft and GainSight campaigns,” the hackers shared their plans with DataBreaches.net.

Sharpen your strategy with mentorship + daily ideas – 30 days free access to our trading program

Source: https://www.cryptopolitan.com/crowdstrike-fires-insider-hackers/

Market Opportunity
SOON Logo
SOON Price(SOON)
$0,1288
$0,1288$0,1288
-%4,02
USD
SOON (SOON) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Early CLARITY Act Deal Reached Between White House and US Lawmakers: Report

Early CLARITY Act Deal Reached Between White House and US Lawmakers: Report

The post Early CLARITY Act Deal Reached Between White House and US Lawmakers: Report appeared on BitcoinEthereumNews.com. Rumors are circulating that a tentative
Share
BitcoinEthereumNews2026/03/21 11:45
China Launches Cross-Border QR Code Payment Trial

China Launches Cross-Border QR Code Payment Trial

The post China Launches Cross-Border QR Code Payment Trial appeared on BitcoinEthereumNews.com. Key Points: Main event involves China initiating a cross-border QR code payment trial. Alipay and Ant International are key participants. Impact on financial security and regulatory focus on illicit finance. China’s central bank, led by Deputy Governor Lu Lei, initiated a trial of a unified cross-border QR code payment gateway with Alipay and Ant International as participants. This pilot addresses cross-border fund risks, aiming to enhance financial security amid rising money laundering through digital channels, despite muted crypto market reactions. China’s Cross-Border Payment Gateway Trial with Alipay The trial operation of a unified cross-border QR code payment gateway marks a milestone in China’s financial landscape. Prominent entities such as Alipay and Ant International are at the forefront, participating as the initial institutions in this venture. Lu Lei, Deputy Governor of the People’s Bank of China, highlighted the systemic risks posed by increased cross-border fund flows. Changes are expected in the dynamics of digital transactions, potentially enhancing transaction efficiency while tightening regulations around illicit finance. The initiative underscores China’s commitment to bolstering financial security amidst growing global fund movements. “The scale of cross-border fund flows is expanding, and the frequency is accelerating, providing opportunities for risks such as cross-border money laundering and terrorist financing. Some overseas illegal platforms transfer funds through channels such as virtual currencies and underground banks, creating a ‘resonance’ of risks at home and abroad, posing a challenge to China’s foreign exchange management and financial security.” — Lu Lei, Deputy Governor, People’s Bank of China Bitcoin and Impact of China’s Financial Initiatives Did you know? China’s latest initiative echoes the Payment Connect project of June 2025, furthering real-time cross-boundary remittances and expanding its influence on global financial systems. As of September 17, 2025, Bitcoin (BTC) stands at $115,748.72 with a market cap of $2.31 trillion, showing a 0.97%…
Share
BitcoinEthereumNews2025/09/18 05:28
XRPL Validator Reveals Why He Just Vetoed New Amendment

XRPL Validator Reveals Why He Just Vetoed New Amendment

Vet has explained that he has decided to veto the Token Escrow amendment to prevent breaking things
Share
Coinstats2025/09/18 00:28