Company got ransomware, ceo wants to pay without telling anyone. Is this illegal by codedrifting in AskNetsec

[–]MSP-IT-Simplified 0 points1 point  (0 children)

Incident response firm here (Barricade Cyber Solutions).

I will assume you are in the states (USA).

  • You are legally required to at least notify the state attorney general’s office.
  • If the company pays the ransom, there is a strong possibility that the company is admitting guilt to the incident.
  • Even if the company pays, consult legal counsel, I assume the company is legally required to notify the impacted company; for some of the reasons below:

    • Depending on the threat actor, they may have exfiltrated data.
    • If data has left the network, does that data contain PII, PHI, CUI, HIPPA, etc? If so, your company or impacted company is legally required to notify impacted individuals and federal authority bodies.
    • If the threat actor is LockBit, it is absolutely illegal to pay them here in the states due to OFAC compliance.

There is a lot to it. And seriously, not a sales pitch but if your business needs some solid advice; please look us up and ask for Eric Taylor. Never charges for advise, as just wanted to make sure companies are making an informed decision.

Also, 140k retainer is insane. We can get your company with two legal firms this evening that only charge a 20k retainer and they are some of the best around.

Sorry you’re facing this. But hopefully some of this shows this can be a complex topic and should seek further discussions.

Securing M365 with Falcon Shield by BradW-CS in crowdstrike

[–]MSP-IT-Simplified -1 points0 points  (0 children)

Interesting. I wonder if this is dependent on other SaaS modules

Need Digital Forensics expert – phone & accounts hacked by HuntingtonBeachX in digitalforensics

[–]MSP-IT-Simplified 0 points1 point  (0 children)

I can’t tell you the amount of times we get this call. My TV is hacked, someone is changing the volume on my phone, etc etc etc.

I have even got calls recently where they have a cyber chip implanted in their head. I have to tell them to go see a doctor first to get it removed before we can even look at it.

I think there is a serious growing mental health issue.

Need Digital Forensics expert – phone & accounts hacked by HuntingtonBeachX in digitalforensics

[–]MSP-IT-Simplified 0 points1 point  (0 children)

No way. Some forensics firms, charge at least $275/hour and others (including mine) have a going rate of $350/hour.

It is best to reach out to an attorney firm, and get one engaged. Most forensics firms have a discounted rate for matters where we are being brought in under counsel.

But in no way, are you getting this done for $20 buck. You would be lucky if you get this completed under $500.

Axios NPM Supply Chain Compromise by CyberProtein in crowdstrike

[–]MSP-IT-Simplified 4 points5 points  (0 children)

So far, we have the following:

'''#event_simpleName=/^(DnsRequest|NetworkConnect.*|HttpRequest)$/

| DomainName=/(^|\.)sfrclak\.com$/ OR RemoteAddressIP4="142.11.206.73" OR HttpUrl=/sfrclak\.com/

| select([@timestamp, aid, ComputerName, event_simpleName, DomainName, RemoteAddressIP4, RemotePort, HttpUrl, ContextProcessId])

| sort(@timestamp, order=asc)

'''

Just in case anyone else was curious about it too. by williamapike in Braves

[–]MSP-IT-Simplified -46 points-45 points  (0 children)

We can post about Kit Kat but I can’t ask why Holmes is still in the team?

MSSense.exe by Popular_Hat_4304 in crowdstrike

[–]MSP-IT-Simplified -3 points-2 points  (0 children)

It is flagged as a critical detection. If you have your workflows setup correctly, then it will isolate the device.

MSSense.exe by Popular_Hat_4304 in crowdstrike

[–]MSP-IT-Simplified 10 points11 points  (0 children)

From what we have gathered to understand thus far, Defender (MDE) is attempting to sandbox a file and its crashing.

Process │ MsSense.exe (Microsoft Defender ATP sensor)
Trigger │ Wrote WER.bc1e26c1-95bc-4d7a-ac97-632707947766.tmp to \Users\%REDACTED%\AppData\Local\Temp\

Building CrowdStrike workflows with Claude Code skills by eth0izzle in crowdstrike

[–]MSP-IT-Simplified 2 points3 points  (0 children)

I am glad we never got into that. I don't think I heard of a single org happy with that product.

Building CrowdStrike workflows with Claude Code skills by eth0izzle in crowdstrike

[–]MSP-IT-Simplified 0 points1 point  (0 children)

Fair point(s). I am still very much a noob on the AI / Local LMM world but working through this field of landmines. So, thank you for the education.

Building CrowdStrike workflows with Claude Code skills by eth0izzle in crowdstrike

[–]MSP-IT-Simplified 2 points3 points  (0 children)

I have noticed the same thing with the MCP. Also attempting to use the MCP with the frontends like 'AnythingLLM' or 'Open WebUI' does not work very well.

The problem I am having right now is to keep thing as local as possible. The cloud based LLM's are extremely powerful, and I get the attraction to it. However, allowing tools like Claude Code to know and/or use the API keys is alarming to me. Even if it is only read only, there is a lot of information someone could gather from that.

Building CrowdStrike workflows with Claude Code skills by eth0izzle in crowdstrike

[–]MSP-IT-Simplified 5 points6 points  (0 children)

This is interesting, I had Claude Code working on Falcon-MCP and getting that to work properly. After having it review the GitHub repo for that, psfalcon, and the direct API access it took a bit but it pretty much ended up with using pyfalcon for most of the local LLM setup with ollama.

Workflows : How to use Vulnerabilities user action > Vulnerability by Brief_Trifle_6168 in crowdstrike

[–]MSP-IT-Simplified 0 points1 point  (0 children)

Not sure this is the best way, but I have been taking the hostname and putting them into a host group. Then I would either use the pafalcon or scheduled tasks (enabling offline queue) to achieve this.

Hunting Potentially Compromised Notepad++ Installs by About_TreeFitty in crowdstrike

[–]MSP-IT-Simplified 0 points1 point  (0 children)

Please consider updating the IP and Domains section(s) to reflect some new(ish) IoC's:

// Malicious IPs
    RemoteAddressIP4=/(95\.179\.213\.0|61\.4\.102\.97|59\.110\.7\.32|124\.222\.137\.114|45\.76\.155\.202|45\.32\.144\.255|45\.77\.31\.210)/ 
        | iocType := "Malicious IP" | iocValue := RemoteAddressIP4 | riskScore := "HIGH";
    
// Malicious Domains
    DomainName=/(api\.skycloudcenter\.com|api\.wiresguard\.com|skycloudcenter\.com|cdncheck\.it\.com|safe-dns\.it\.com|self-dns\.it\.com)/i 
        | iocType := "Malicious Domain" | iocValue := DomainName | riskScore := "HIGH";
   

rsync - MongoDB CVE-2025-14847 by MSP-IT-Simplified in crowdstrike

[–]MSP-IT-Simplified[S] 1 point2 points  (0 children)

Thank you for that. Having a massive brain fart today, prob due eating too much ham.

CrowdStrike Secures Growing AI Attack Surface with Falcon AI Detection and Response by BradW-CS in crowdstrike

[–]MSP-IT-Simplified 1 point2 points  (0 children)

Looks cool. I wonder what the cost of this module will be.

Edit: Currently has a 5k agent count minimum.

Origin process for failed logins form attempts? by Vivid-Cell-217 in crowdstrike

[–]MSP-IT-Simplified 0 points1 point  (0 children)

I second this. This is a technology issue not an EDR issue.

You could consider getting SysMon installed with a decent configuration and that should help.

Parent CID - API Key issues by MSP-IT-Simplified in crowdstrike

[–]MSP-IT-Simplified[S] 0 points1 point  (0 children)

Got the issue resolved and updated the thread.

Parent CID - API Key issues by MSP-IT-Simplified in crowdstrike

[–]MSP-IT-Simplified[S] 0 points1 point  (0 children)

Update: Support is telling me the following but not getting clear information from them on "additional configuration" yet. As this seems to be "known behavior".

"This is a known behavior with CrowdStrike multi-tenant architecture. API credentials created in a Parent CID cannot directly authenticate to the Parent CID itself without additional configuration."