Cybersecurity firm CrowdStrike has fired an employee suspected of leaking internal data to a hacking group known as Scattered Lapsus$ Hunters. The incident, confirmed by the company, involved screenshots of internal systems being published on a public Telegram channel. The leaked data allegedly included access to employee dashboards, raising concerns about potential broader compromise.
Breach Details and Company Response
The hackers claimed to have infiltrated CrowdStrike through a recent breach at Gainsight, a customer relationship management (CRM) firm. According to the hackers, stolen information from Gainsight was used to gain access to CrowdStrike’s systems.
However, CrowdStrike vehemently denies that its systems were compromised. The company stated that it terminated the employee’s access after discovering they had shared screenshots of their computer screen externally. A spokesperson emphasized that customers remained protected throughout the incident, and the matter has been handed over to law enforcement.
Scattered Lapsus$ Hunters: A Growing Threat
Scattered Lapsus$ Hunters is a coalition of hacking groups, including ShinyHunters, Scattered Spider, and Lapsus$. These groups are known for employing social engineering tactics to trick employees into granting unauthorized access to sensitive systems and databases. This method bypasses traditional security measures by exploiting human vulnerabilities rather than technical flaws.
Gainsight, the CRM firm allegedly used as an entry point, did not respond to requests for comment. The incident highlights the increasing sophistication of cyberattacks, where human error or malicious insiders can create significant security risks.
The Bigger Picture
This breach underscores the growing trend of attackers targeting internal access points, such as employees, rather than attempting direct system hacks. It also demonstrates how breaches at third-party vendors can have ripple effects, potentially compromising multiple organizations. The incident at CrowdStrike serves as a reminder that even leading cybersecurity firms are not immune to human-driven attacks.
The matter is now with law enforcement, but the incident has already exposed weaknesses in internal security protocols and the vulnerability of employee-level access.




















































