This article may be affected by the following
current event:
2024 CrowdStrike incident. Information in this article may change rapidly as the event progresses. Initial news reports may be
unreliable. The
last updates to this article
may not reflect the most current information. (July 2024) |
![]() | |
Company type | Public |
---|---|
| |
Industry | Information security |
Founded | 2011 |
Founders |
|
Headquarters | , United States |
Key people | George Kurtz ( CEO) |
Revenue | ![]() |
![]() | |
![]() | |
Total assets | ![]() |
Total equity | ![]() |
Number of employees | 7,925 (FY24) |
Website |
crowdstrike |
Footnotes / references Financials as of fiscal year ended January 31, 2024 [update]. References: [1] |
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload protection and endpoint security, threat intelligence, and cyberattack response services. [2] [3]
The company has been involved in investigations of several high-profile cyberattacks, including the 2014 Sony Pictures hack, the 2015–16 cyberattacks on the Democratic National Committee (DNC), and the 2016 email leak involving the DNC. [4] [5] In July 2024, a faulty update to its security software caused global computer outages, impacting air travel, banking, broadcasting, and other services. [6] [7]
CrowdStrike was co-founded by George Kurtz (CEO), Dmitri Alperovitch (former CTO), and Gregg Marston (CFO, retired) in 2011. [8] [9] [10] [11] In 2012, Shawn Henry, a former Federal Bureau of Investigation (FBI) official, was hired to lead the subsidiary CrowdStrike Services, Inc., which focused on proactive and incident response services. [12] [13] In June 2013, the company launched its first product, CrowdStrike Falcon, which provided endpoint protection, threat intelligence and attribution. [14] [15]
In May 2014, CrowdStrike's reports assisted the United States Department of Justice in charging five Chinese military hackers for economic cyber espionage against United States corporations. [16] CrowdStrike also uncovered the activities of Energetic Bear, a group connected to Russia's Federal Security Service that conducted intelligence operations against global targets, primarily in the energy sector. [17]
After the Sony Pictures hack, CrowdStrike uncovered evidence implicating the government of North Korea and demonstrated how the attack was carried out. [18] In 2014, CrowdStrike played a role in identifying members of Putter Panda, the state-sponsored Chinese group of hackers also known as PLA Unit 61486. [19] [20]
In May 2015, the company released information about VENOM, a critical flaw in an open-source hypervisor called Quick Emulator (QEMU), that allowed attackers to access sensitive personal information. [21] [22] In October 2015, CrowdStrike announced that it had identified Chinese hackers attacking technology and pharmaceutical companies around the time that US President Barack Obama and China's leader Xi Jinping publicly agreed not to conduct economic espionage against each other. The alleged hacking would have been in violation of that agreement. [23]
In July 2015, Google invested in the company's Series C funding round, which was followed by Series D and Series E, raising a total of $480 million as of May 2019. [24] [25] [26]
In 2017, the company reached a valuation of more than $1 billion with an estimated annual revenue of $100 million. [27] In June 2018, the company said it was valued at more than $3 billion. [25] Investors include Telstra, March Capital Partners, Rackspace, Accel Partners and Warburg Pincus. [28] [29]
In June 2019, the company made an initial public offering on the Nasdaq. [30] [31]
In September 2020, CrowdStrike acquired zero trust and conditional access technology provider Preempt Security for $96 million. [32] In February 2021, the company acquired Danish log management platform Humio for $400 million with plans to integrate Humio's log aggregation into CrowdStrike's XDR offering. [33] Later that November, CrowdStrike acquired SecureCircle, a SaaS-based cybersecurity service that extends zero trust endpoint security to include data. [34] In December 2021, the company moved its headquarters location from Sunnyvale, California, to Austin, Texas. [35] In 2023, CrowdStrike introduced CrowdStream service in collaboration with Cribl.io. [36] CrowdStrike has also focused on working with the U.S. government and selling its services to government agencies. [37] CrowdStrike joined the S&P 500 index in June 2024. [38] In 2023, CrowdStrike acquired Israeli cybersecurity startup Bionic.ai. [39] In 2024, CrowdStrike acquired Israeli startup Flow Security. [40]
![]() | This section documents a
current event. Information may change rapidly as the event progresses, and initial news reports may be
unreliable. The
latest updates to this section
may not reflect the most current information. (July 2024) |
On July 19, 2024, a faulty software update to the CrowdStrike vulnerability scanner Falcon Sensor caused blue screens of death on Microsoft Windows machines, disrupting millions of Windows computers worldwide. [41] [42] Affected machines were forced into a bootloop, making them unusable. The downtime caused a widespread global impact, grounding commercial airline flights, temporarily taking Sky News offline, and impacting 911 emergency call centers. [43] On July 19, 2024, CrowdStrike shares closed trading at a price of $304.96 -38.09 with a decrease of -11.10%. [44]
CrowdStrike helped investigate the Democratic National Committee cyberattacks and a connection to Russian intelligence services. On March 20, 2017, James Comey testified before congress stating, "CrowdStrike, Mandiant, and ThreatConnect review[ed] the evidence of the hack and conclude[d] with high certainty that it was the work of APT 28 and APT 29 who are known to be Russian intelligence services." [45] Comey previously testified in January 2017 that a request for FBI forensics investigators to access the DNC servers was denied, saying "Ultimately what was agreed to is the private company [CrowdStrike] would share with us what they saw." [46]
In December 2016, CrowdStrike released a report stating that Russian government-affiliated group Fancy Bear had hacked a Ukrainian artillery app. [47] They concluded that Russia had used the hack to cause large losses to Ukrainian artillery units. The app (called ArtOS) is installed on tablet PCs and used for fire-control. [48] CrowdStrike also found a hacked variation of POPR-D30 being distributed on Ukrainian military forums that utilized an X-Agent implant. [49]
The International Institute for Strategic Studies rejected CrowdStrike's assessment that claimed hacking caused losses to Ukrainian artillery units, saying that their data on Ukrainian D30 howitzer losses was misused in CrowdStrike's report. The Ukrainian Ministry of Defense also rejected the CrowdStrike report, stating that actual artillery losses were much smaller than what was reported by CrowdStrike and were not associated with Russian hacking. [50] Prior to this, CrowdStrike had published a report claiming that malware used in Ukraine and against the Democratic National Committee (DNC) appeared to be unique and identical, further evidence for a Russian origin of the DNC attack. [51]
Cybersecurity firm SecureWorks discovered a list of email addresses targeted by Fancy Bear in phishing attacks. The list included the email address of Yaroslav Sherstyuk, the developer of ArtOS. [52] Additional Associated Press research supports CrowdStrike's conclusions about Fancy Bear. [53] Radio Free Europe notes that the AP report "lends some credence to the original CrowdStrike report, showing that the app had, in fact, been targeted." [54]
In the Trump–Ukraine scandal, a transcript of a conversation between Donald Trump, the former president of the United States, and Volodymyr Zelensky, the president of Ukraine, had Trump asking Zelensky to look into a conspiracy theory appearing on far-right websites such as Breitbart News and Russian state media outlets such as Russia Today and Sputnik [55] regarding CrowdStrike – namely, that the Ukrainian government used CrowdStrike to hack into the Democratic National Committee's servers in 2016 and framed Russia for the crime in order to undermine Trump's victory in the 2016 presidential election. [56] [57] The conspiracy theory has been repeatedly debunked. [58] [59] [60]
This article may be affected by the following
current event:
2024 CrowdStrike incident. Information in this article may change rapidly as the event progresses. Initial news reports may be
unreliable. The
last updates to this article
may not reflect the most current information. (July 2024) |
![]() | |
Company type | Public |
---|---|
| |
Industry | Information security |
Founded | 2011 |
Founders |
|
Headquarters | , United States |
Key people | George Kurtz ( CEO) |
Revenue | ![]() |
![]() | |
![]() | |
Total assets | ![]() |
Total equity | ![]() |
Number of employees | 7,925 (FY24) |
Website |
crowdstrike |
Footnotes / references Financials as of fiscal year ended January 31, 2024 [update]. References: [1] |
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload protection and endpoint security, threat intelligence, and cyberattack response services. [2] [3]
The company has been involved in investigations of several high-profile cyberattacks, including the 2014 Sony Pictures hack, the 2015–16 cyberattacks on the Democratic National Committee (DNC), and the 2016 email leak involving the DNC. [4] [5] In July 2024, a faulty update to its security software caused global computer outages, impacting air travel, banking, broadcasting, and other services. [6] [7]
CrowdStrike was co-founded by George Kurtz (CEO), Dmitri Alperovitch (former CTO), and Gregg Marston (CFO, retired) in 2011. [8] [9] [10] [11] In 2012, Shawn Henry, a former Federal Bureau of Investigation (FBI) official, was hired to lead the subsidiary CrowdStrike Services, Inc., which focused on proactive and incident response services. [12] [13] In June 2013, the company launched its first product, CrowdStrike Falcon, which provided endpoint protection, threat intelligence and attribution. [14] [15]
In May 2014, CrowdStrike's reports assisted the United States Department of Justice in charging five Chinese military hackers for economic cyber espionage against United States corporations. [16] CrowdStrike also uncovered the activities of Energetic Bear, a group connected to Russia's Federal Security Service that conducted intelligence operations against global targets, primarily in the energy sector. [17]
After the Sony Pictures hack, CrowdStrike uncovered evidence implicating the government of North Korea and demonstrated how the attack was carried out. [18] In 2014, CrowdStrike played a role in identifying members of Putter Panda, the state-sponsored Chinese group of hackers also known as PLA Unit 61486. [19] [20]
In May 2015, the company released information about VENOM, a critical flaw in an open-source hypervisor called Quick Emulator (QEMU), that allowed attackers to access sensitive personal information. [21] [22] In October 2015, CrowdStrike announced that it had identified Chinese hackers attacking technology and pharmaceutical companies around the time that US President Barack Obama and China's leader Xi Jinping publicly agreed not to conduct economic espionage against each other. The alleged hacking would have been in violation of that agreement. [23]
In July 2015, Google invested in the company's Series C funding round, which was followed by Series D and Series E, raising a total of $480 million as of May 2019. [24] [25] [26]
In 2017, the company reached a valuation of more than $1 billion with an estimated annual revenue of $100 million. [27] In June 2018, the company said it was valued at more than $3 billion. [25] Investors include Telstra, March Capital Partners, Rackspace, Accel Partners and Warburg Pincus. [28] [29]
In June 2019, the company made an initial public offering on the Nasdaq. [30] [31]
In September 2020, CrowdStrike acquired zero trust and conditional access technology provider Preempt Security for $96 million. [32] In February 2021, the company acquired Danish log management platform Humio for $400 million with plans to integrate Humio's log aggregation into CrowdStrike's XDR offering. [33] Later that November, CrowdStrike acquired SecureCircle, a SaaS-based cybersecurity service that extends zero trust endpoint security to include data. [34] In December 2021, the company moved its headquarters location from Sunnyvale, California, to Austin, Texas. [35] In 2023, CrowdStrike introduced CrowdStream service in collaboration with Cribl.io. [36] CrowdStrike has also focused on working with the U.S. government and selling its services to government agencies. [37] CrowdStrike joined the S&P 500 index in June 2024. [38] In 2023, CrowdStrike acquired Israeli cybersecurity startup Bionic.ai. [39] In 2024, CrowdStrike acquired Israeli startup Flow Security. [40]
![]() | This section documents a
current event. Information may change rapidly as the event progresses, and initial news reports may be
unreliable. The
latest updates to this section
may not reflect the most current information. (July 2024) |
On July 19, 2024, a faulty software update to the CrowdStrike vulnerability scanner Falcon Sensor caused blue screens of death on Microsoft Windows machines, disrupting millions of Windows computers worldwide. [41] [42] Affected machines were forced into a bootloop, making them unusable. The downtime caused a widespread global impact, grounding commercial airline flights, temporarily taking Sky News offline, and impacting 911 emergency call centers. [43] On July 19, 2024, CrowdStrike shares closed trading at a price of $304.96 -38.09 with a decrease of -11.10%. [44]
CrowdStrike helped investigate the Democratic National Committee cyberattacks and a connection to Russian intelligence services. On March 20, 2017, James Comey testified before congress stating, "CrowdStrike, Mandiant, and ThreatConnect review[ed] the evidence of the hack and conclude[d] with high certainty that it was the work of APT 28 and APT 29 who are known to be Russian intelligence services." [45] Comey previously testified in January 2017 that a request for FBI forensics investigators to access the DNC servers was denied, saying "Ultimately what was agreed to is the private company [CrowdStrike] would share with us what they saw." [46]
In December 2016, CrowdStrike released a report stating that Russian government-affiliated group Fancy Bear had hacked a Ukrainian artillery app. [47] They concluded that Russia had used the hack to cause large losses to Ukrainian artillery units. The app (called ArtOS) is installed on tablet PCs and used for fire-control. [48] CrowdStrike also found a hacked variation of POPR-D30 being distributed on Ukrainian military forums that utilized an X-Agent implant. [49]
The International Institute for Strategic Studies rejected CrowdStrike's assessment that claimed hacking caused losses to Ukrainian artillery units, saying that their data on Ukrainian D30 howitzer losses was misused in CrowdStrike's report. The Ukrainian Ministry of Defense also rejected the CrowdStrike report, stating that actual artillery losses were much smaller than what was reported by CrowdStrike and were not associated with Russian hacking. [50] Prior to this, CrowdStrike had published a report claiming that malware used in Ukraine and against the Democratic National Committee (DNC) appeared to be unique and identical, further evidence for a Russian origin of the DNC attack. [51]
Cybersecurity firm SecureWorks discovered a list of email addresses targeted by Fancy Bear in phishing attacks. The list included the email address of Yaroslav Sherstyuk, the developer of ArtOS. [52] Additional Associated Press research supports CrowdStrike's conclusions about Fancy Bear. [53] Radio Free Europe notes that the AP report "lends some credence to the original CrowdStrike report, showing that the app had, in fact, been targeted." [54]
In the Trump–Ukraine scandal, a transcript of a conversation between Donald Trump, the former president of the United States, and Volodymyr Zelensky, the president of Ukraine, had Trump asking Zelensky to look into a conspiracy theory appearing on far-right websites such as Breitbart News and Russian state media outlets such as Russia Today and Sputnik [55] regarding CrowdStrike – namely, that the Ukrainian government used CrowdStrike to hack into the Democratic National Committee's servers in 2016 and framed Russia for the crime in order to undermine Trump's victory in the 2016 presidential election. [56] [57] The conspiracy theory has been repeatedly debunked. [58] [59] [60]