Cybersecurity giant CrowdStrike has fired a "suspicious insider" who allegedly fed company information to the notorious Scattered Lapsus$ Hunters hacking collective. The incident exposes how even top cybersecurity firms face insider threats, with the employee sharing internal screenshots before being terminated last month.
CrowdStrike just confirmed what cybersecurity experts have long warned about - sometimes the threat comes from inside the house. The company terminated a "suspicious insider" last month after discovering the employee was sharing sensitive internal information with hackers, marking a rare public admission of insider betrayal at a major security firm.
The incident came to light when Scattered Lapsus$ Hunters, a notorious hacking collective, published screenshots on their public Telegram channel showing what appeared to be insider access to CrowdStrike's internal systems. The images revealed employee dashboards, including Okta authentication portals used for accessing company applications - the kind of behind-the-scenes access that external hackers typically can't obtain.
A representative reached out to The Tech Buzz to confirm that CrowdStrike's "systems were never compromised and customers remained protected throughout."
"Our systems were never compromised and customers remained protected throughout," CrowdStrike spokesperson Kevin Benacci told TechCrunch. The company says it "determined he shared pictures of his computer screen externally" and immediately terminated access before turning the case over to law enforcement.
The timing couldn't be worse for CrowdStrike, which is still rebuilding trust after its global Windows outage earlier this year knocked out millions of computers worldwide. That incident, caused by a faulty software update, highlighted the company's massive reach across enterprise systems - making internal security lapses even more concerning for corporate customers.
Scattered Lapsus$ Hunters initially claimed they'd compromised CrowdStrike through the recent Gainsight breach, where hackers accessed customer relationship data. The group said they used stolen Gainsight information to break into CrowdStrike's systems. But the insider revelation suggests a more direct route - an employee willing to share access from the inside.
This collective represents a merger of some of cybersecurity's most persistent threats. Scattered Lapsus$ Hunters combines members from ShinyHunters, Scattered Spider, and the original Lapsus$ group - teams known for sophisticated social engineering attacks that trick employees into granting system access. Their recent campaigns have targeted data from over 1 billion records across Salesforce customers.
The October data theft spree claimed victims including insurance giant Allianz Life, airline Qantas, automaker Stellantis, credit bureau TransUnion, and HR platform Workday. Each incident leveraged the interconnected nature of cloud services, where one compromised vendor can expose dozens of downstream customers.
Industry experts say insider threats remain one of cybersecurity's hardest problems to solve. Unlike external attacks that leave digital fingerprints, malicious insiders already have legitimate access and know exactly where valuable data lives. "You can build the strongest perimeter defense in the world, but if someone inside decides to take screenshots, all those controls become irrelevant," one former NSA analyst told us.
For CrowdStrike's enterprise customers, the incident raises uncomfortable questions about vetting and monitoring. If a leading cybersecurity provider can't completely prevent insider threats, what does that mean for other companies relying on similar access controls and trust-based systems?
The case also highlights how modern breach investigations often uncover multiple attack vectors. What initially appeared to be a sophisticated external hack through supply chain compromise turned out to involve old-fashioned human betrayal - someone with legitimate access choosing to share it with criminals.
Law enforcement agencies are now investigating, though prosecuting insider threat cases often proves challenging due to questions around intent and authorized access. The fired employee's identity and potential charges remain unclear, with CrowdStrike declining to provide additional details about the ongoing investigation.
The CrowdStrike insider incident serves as a stark reminder that cybersecurity threats increasingly come from within trusted networks. As companies invest billions in perimeter defenses and AI-powered threat detection, human factors remain the weakest link. For enterprises evaluating security vendors, this case underscores the need to understand not just technical capabilities, but also internal controls and employee vetting processes. The investigation's outcome could set important precedents for how the industry handles insider threat prosecutions and disclosure requirements.