Researchers Bypassed CrowdStrike Falcon Sensor to Execute Malicious Applications

Security researchers at SEC Consult have discovered a significant vulnerability in CrowdStrike’s Falcon Sensor that allowed attackers to bypass detection mechanisms and execute malicious applications. The researchers at SEC Consult found that after an attacker gained NT AUTHORITY\SYSTEM permissions on a Windows machine, they could use Process Explorer to suspend CrowdStrike Falcon Sensor processes. When researcher resumed the suspended processes, CrowdStrike would immediately quarantine and remove the malicious tools, confirming that the suspension was indeed bypassing normal detection protocols. In their proof of concept, SEC Consult demonstrated how tools like winPEAS, Rubeus, and Certipy—typically blocked by CrowdStrike—could run unimpeded when the sensor processes were suspended. Process Explorer allowed for the suspension of these critical security processes without any resistance. When the Falcon Sensor processes were suspended, malicious applications that would normally be terminated or removed could execute freely and remain on the disk. While killing these processes was prohibited by the system, suspending them was surprisingly allowed, creating a significant security loophole. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The bypass technique involved suspending the EDR processes rather than attempting to terminate them, effectively creating a window of opportunity for malicious actors to operate undetected. However, by 2025, CrowdStrike silently implemented fixes that prevent process suspension, effectively acknowledging the security implications that they had previously dismissed. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. Processes that were already hooked at the time of sensor suspension remained supervised by CrowdStrike’s kernel processes. Tushar is a Cyber security content editor with a passion for creating captivating and informative content.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 06 Mar 2025 14:25:17 +0000


Cyber News related to Researchers Bypassed CrowdStrike Falcon Sensor to Execute Malicious Applications

Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
1 year ago Crowdstrike.com
CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent - CrowdStrike is honored to be named Partner of the Year for several 2023 Geo and Global AWS Partner Awards at Amazon Web Services re:Invent 2023, where we are participating this year as a Diamond Sponsor. These accomplishments demonstrate our ...
2 years ago Crowdstrike.com
CVE-2025-1146 - CrowdStrike uses industry-standard TLS (transport layer security) to secure communications from the Falcon sensor to the CrowdStrike cloud. CrowdStrike has identified a validation logic error in the Falcon sensor for Linux, Falcon Kubernetes ...
10 months ago Tenable.com
Researchers Bypassed CrowdStrike Falcon Sensor to Execute Malicious Applications - Security researchers at SEC Consult have discovered a significant vulnerability in CrowdStrike’s Falcon Sensor that allowed attackers to bypass detection mechanisms and execute malicious applications. The researchers at SEC Consult found that ...
9 months ago Cybersecuritynews.com
CrowdStrike Falcon Sensor for Linux TLS Vulnerability Enabling MiTM Attack - The vulnerability affects versions of the Falcon Sensor for Linux and related components prior to version 7.06. The issue arises from incorrect processing of server certificates during TLS communication with the CrowdStrike cloud. CrowdStrike has ...
10 months ago Cybersecuritynews.com CVE-2025-1146
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization - The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. As organizations increase ...
1 year ago Crowdstrike.com
CVE-2025-42706 - A logic error exists in the Falcon sensor for Windows that could allow an attacker, with the prior ability to execute code on a host, to delete arbitrary files. CrowdStrike released a security fix for this issue in Falcon sensor for Windows versions ...
2 months ago
CVE-2025-42701 - A race condition exists in the Falcon sensor for Windows that could allow an attacker, with the prior ability to execute code on a host, to delete arbitrary files. CrowdStrike released a security fix for this issue in Falcon sensor for Windows ...
2 months ago
Hello Authentication Vulnerabilities Discovered: Stay Safe - In the realm of cybersecurity, a recent study has brought to light a series of Hello Authentication vulnerabilities that could compromise the Windows Hello authentication on popular laptop models, including Dell Inspiron 15, Lenovo ThinkPad T14, and ...
2 years ago Securityboulevard.com
Generative AI Takes on SIEM - With more vendors adding support for generative AI to their platforms and products, life for security analysts seems to be getting deceptively easier. While adding generative AI capabilities to security information and event management is still in ...
2 years ago Darkreading.com
US Grounds SpaceX Falcon After Second-Stage Issue | Silicon UK - The US Federal Aviation Administration (FAA) has grounded SpaceX’s Falcon rockets for the third time in three months after a second-stage problem occurred following the successful launch of a Dragon Crew mission that brought two astronauts to ...
1 year ago Silicon.co.uk Rocke
Top 10 XDR (Extended Detection & Response) Solutions - 2025 - CrowdStrike Falcon XDR uses this data to extend EDR outcomes and advanced threat detection across the security stack, thereby stopping breaches more quickly. It does this by using CrowdStrike’s world-class machine learning, artificial ...
8 months ago Cybersecuritynews.com
Privilege elevation exploits used in over 50% of insider attacks - Elevation of privilege flaws are the most common vulnerability leveraged by corporate insiders when conducting unauthorized activities on networks, whether for malicious purposes or by downloading risky tools in a dangerous manner. A report by ...
2 years ago Bleepingcomputer.com CVE-2017-0213
CrowdStrike to Acquire OnUM to Boost Falcon Next-Gen SIEM Capabilities - CrowdStrike, a leader in cybersecurity technology, has announced its acquisition of OnUM, a company specializing in next-generation Security Information and Event Management (SIEM) solutions. This strategic move aims to enhance CrowdStrike's Falcon ...
4 months ago Darkreading.com
\Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant - Kindred Tech, the organization responsible for maintaining and curating the VICS (Video, Image, Classification Schema) data model, welcomes Falcon-NEO2 into the network of officially validated tools that support international standards for ...
7 months ago Cybersecuritynews.com
CrowdStrike to Buy AI Security Company Pangea - CrowdStrike, a leading cybersecurity firm, has announced its acquisition of Pangea, an AI-driven security company. This strategic move aims to enhance CrowdStrike's capabilities in artificial intelligence and machine learning to better detect and ...
3 months ago Wsj.com
CrowdStrike Falcon Windows Sensor Vulnerability Exposes Systems to Potential Exploits - A critical vulnerability has been discovered in the CrowdStrike Falcon Windows sensor, a widely used endpoint detection and response (EDR) tool. This flaw could allow attackers to exploit the sensor, potentially gaining unauthorized access to ...
2 months ago Cybersecuritynews.com CVE-2024-12345
Seraphic Browser Native Protection Now Available for Purchase on the CrowdStrike Marketplace - Seraphic Security has announced that its Seraphic Browser Native Protection is now available for purchase on the CrowdStrike Marketplace. This integration allows organizations to enhance their endpoint security by leveraging Seraphic's advanced ...
3 months ago Cybersecuritynews.com
We're upgrading CrowdStrike despite a post-earnings stock drop - CrowdStrike, a leading cybersecurity firm, recently experienced a stock drop following its earnings report. Despite this, analysts have upgraded their outlook on the company, citing strong fundamentals and growth potential in the cybersecurity ...
4 months ago Cnbc.com
CrowdStrike Set to Acquire Onum - CrowdStrike, a leading cybersecurity technology company, is set to acquire Onum, a firm specializing in cloud security and compliance solutions. This strategic acquisition aims to enhance CrowdStrike's cloud security capabilities, providing customers ...
3 months ago Cybersecuritynews.com
Threat actors misuse OAuth applications to automate financially driven attacks - Threat actors are misusing OAuth applications as an automation tool in financially motivated attacks. Threat actors compromise user accounts to create, modify, and grant high privileges to OAuth applications that they can misuse to hide malicious ...
2 years ago Microsoft.com
MEDUSA Ransomware Using Malicious ABYSSWORKER Driver to Disable EDR - Elastic Security Labs analysts noted that this driver is specifically designed to target and silence different EDR vendors, effectively removing a critical layer of defense against ransomware attacks. One particularly troubling aspect of the ...
9 months ago Cybersecuritynews.com Abyss Silence Medusa
CVE-2025-21992 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
CrowdStrike shares jump after strong investor day, raising 2025 revenue outlook - CrowdStrike Holdings, a leading cybersecurity company, saw its shares rise significantly following a positive investor day event where the company raised its revenue outlook for 2025. The company highlighted strong growth driven by its cloud-native ...
3 months ago Cnbc.com
PowerSchool previously hacked in August, months before data breach - Although the company has not officially disclosed the number of people impacted by this incident, BleepingComputer first reported that the threat actor claimed to have stolen the data of 72 million people, including students and teachers. In that ...
9 months ago Bleepingcomputer.com