The CrowdStrike insider threat incident in November 2025 stands as a crucial illustration of how the insider threat continues to be a top concern, regardless of an organization’s size or technical sophistication. Despite advanced defenses and frequent penetration tests (pentests), the insider threat remains uniquely positioned to bypass security measures, highlighting why it demands special focus in any security strategy.
CrowdStrike’s Insider Threat Experience
CrowdStrike detected and terminated an employee who became an insider threat by leaking sensitive system screenshots to the Scattered Lapsus$ Hunters hacker collective. The insider threat was offered $25,000 for company authentication data and privileged access to internal dashboards. Fortunately, early signs of insider threat activity were caught by CrowdStrike’s security monitoring, no customer data or production systems were affected, and law enforcement was involved. However, this episode is a stark demonstration of how insider threat can materialize unexpectedly within even the best-defended environments.

Why Insider Threat is Different
The insider threat operates from within, making it distinct from threats that a pentest is designed to uncover. A pentest simulates external and occasional internal attacks to identify technical weaknesses in systems and networks. However, a pentest cannot predict or capture the scope of an insider threat: motivations, grievances, or malicious intent held by trusted employees. The CrowdStrike case demonstrates how the insider threat can go undetected by traditional assessments, using legitimate credentials with deep system knowledge to sidestep many security barriers.
The Tactics of Insider Threat
Insider threat actors often exploit their familiarity with help desk routines, social engineering, and gaps in internal access controls. Recruitment of insiders is now common, with criminal groups actively looking for employees willing to become an insider threat. These groups target staff with access to key assets, offering payment in exchange for sensitive information or access tokens—exactly as was attempted in the CrowdStrike incident.
Addressing Insider Threat
Organizations must treat the insider threat as an ongoing risk that requires a multi-layered approach:
- Continuous behavioral monitoring to identify early indicators of insider threat.
- Hiring practices that favor candidates with stable records and sector loyalty can help reduce the likelihood of insider threat risks.
- Competitive compensation and transparent complaint channels further decrease the risk of insider threat by fostering employee satisfaction and giving them a voice.
- Security awareness training that emphasizes recognizing the signs and risks of insider threat is critical at all levels.
No matter how robust a pentest, it simply cannot substitute for a comprehensive insider threat program designed around culture, trust, and vigilance.
Relevant sources for further reading:
- https://breached.company/crowdstrike-confirms-insider-threat-linked-to-scattered-lapsus-hunters-cybercrime-alliance/
- https://techcrunch.com/2025/11/21/crowdstrike-fires-suspicious-insider-who-passed-information-to-hackers/
- https://cyberpress.org/crowdstrike-terminates-staff-over-alleged-collaboration-with-hackers/
- https://ia.acs.org.au/article/2025/crowdstrike-fires–insider–for-working-with-hackers.html
- https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/
- https://breached.company/crowdstrike-confirms-insider-threat-linked-to-scattered-lapsus-hunters-cybercrime-alliance/
- https://techcrunch.com/2025/11/21/crowdstrike-fires-suspicious-insider-who-passed-information-to-hackers/
- https://cyberpress.org/crowdstrike-terminates-staff-over-alleged-collaboration-with-hackers/
- https://ia.acs.org.au/article/2025/crowdstrike-fires–insider–for-working-with-hackers.html
- https://www.thestack.technology/crowdstrike-ejects-insider/
- https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/
- https://databreaches.net/2025/11/21/crowdstrike-catches-insider-feeding-information-to-scatteredlapsushunters/
- https://www.reddit.com/r/cybersecurity/comments/1p3tac2/crowdstrike_catches_insider_feeding_information/
- https://www.crowdstrike.com/en-us/global-threat-report/
- https://www.youtube.com/watch?v=cbosM0b4oEM
Leave a Reply