Business Information Group, Inc.’s Post

Business Information Group, Inc. reposted this

View organization page for ConnectWise, graphic

145,028 followers

Following the CrowdStrike/Microsoft outage, there have been reports of active phishing campaigns exploiting the incident. Stay vigilant. Stay Secure. #crowdstrikeoutage #crowdstrike #cybersecurity #phishing #Microsoft

Update on CrowdStrike Outage Impact

Update on CrowdStrike Outage Impact

ConnectWise on LinkedIn

Sergio Pires

Sr. Engineer | MSP Manager at ACS Services, Inc.

1mo

ConnectWise had provided the following update to assist its clients should they run into BSOD (blue screen) issues: 1. Restart your computer in Safe Mode with Networking, per the required OS steps in the first article at the bottom of this post. 2. On the lock or sign-in screen, keep the Shift key pressed, click on the Power button, and then press Restart. 3. After a short while, you should see a blue screen with three options. Click or tap on the second one: Troubleshoot. 4. On the Troubleshoot screen, choose “Advanced options.” 5. Select Startup Settings. 6. Select Restart. 7. The computer restarts and enters the Startup Settings menu. Select 5 or F5 to start the computer in Safe Mode with Networking. Once in Safe Mode, please follow the recommended steps from CrowdStrike on the second article at the bottom of this post to remediate the file. First article (Start your PC in safe mode): https://support.microsoft.com/en-us/windows/start-your-pc-in-safe-mode-in-windows-92c27cff-db89-8644-1ce4-b3e5e56fe234 Second article (CrownStrike blog): https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts

Tim White

CISSP | IT Security Leader | CIO & CISO Services | Sales Engineer | Empowering your Team to Secure your Future

1mo

This is great information ConnectWise team! Thank you for the heads up on how bad actors are leveraging this crisis and what to look out for! Excellent, timely communication! "Threat actors are using domains such as "crowdstrikebluescreen[.]com" and "fix-crowdstrike-apocalypse[.]com" to deceive users into providing sensitive information. These domains, identified through urlscan.io, mimic legitimate CrowdStrike support pages and prompt users to download fake updates after paying with Bitcoin or other cryptocurrency."

LoriBeth Blair

Deliverability problem slayer, email platform and infrastructure advisor, cybersecurity enthusiast, spam filter lover, ex-data analyst, ex-chef, ex-Spanish tutor, ex-arms dealer, ex-construction worker.

1mo

Doing the community a service by alerting them on phishing attempts around this outage. Remain vigilant folks, the scammers are always out there looking for how they can take advantage and make a bad situation even worse.

Threat actors are always on the loose, exploiting any hot shot incident, was definitely expected. Let us always prepare for the worse and mitigate the attack surfaces.

See more comments

To view or add a comment, sign in

Explore topics