Threat Actor: Unknown | unknown
Victim: CrowdStrike | CrowdStrike
Price: Not specified
Exfiltrated Data Type: Indicators of Compromise (IoCs)
Key Points :
- The threat actor shared a list of 100,000 IoCs in response to allegations made by CrowdStrike.
- The list includes critical fields such as indicators, types, malware families, and associated threat actors.
- The threat actor claims to possess additional data that could be disclosed if accusations persist.
- The incident highlights ongoing tensions between threat actors and cybersecurity firms.
The threat actor, who had recently shared a post about an alleged data breach, today expressed their frustration over claims mentioned in a CrowdStrike article.
In response to these accusations, the threat actor publicly shared a detailed list comprising 100,000 IoCs. This extensive list includes a variety of critical fields, such as indicators, types, malware families, associated threat actors, related reports, kill chains, publication dates, last updates, malicious confidence levels, and descriptive labels. A sample data and the link for the alleged breach is also included in the post.
Additionally, the threat actor, issued a further threat, claiming they possess even more data. They warned that they could disclose this additional information if the allegations in the CrowdStrike article continue to persist.

The post UsDoD Allegedly Published CrowdStrike IoC List appeared first on Daily Dark Web.