…according to a Twitter post by the Chief Informational Security Officer of Grand Canyon Education.

So, does anyone else find it odd that the file that caused everything CrowdStrike to freak out, C-00000291-
00000000-00000032.sys was 42KB of blank/null values, while the replacement file C-00000291-00000000-
00000.033.sys was 35KB and looked like a normal, if not obfuscated sys/.conf file?

Also, apparently CrowdStrike had at least 5 hours to work on the problem between the time it was discovered and the time it was fixed.

397 points
*

Every affected company should be extremely thankful that this was an accidental bug, because if crowdstrike gets hacked, it means the bad actors could basically ransom I don’t know how many millions of computers overnight

Not to mention that crowdstrike will now be a massive target from hackers trying to do exactly this

permalink
report
reply
223 points

Don’t Google solar winds

permalink
report
parent
reply
86 points

Holy hell

permalink
report
parent
reply
53 points

New vulnerability just dropped

permalink
report
parent
reply
22 points

Oooooooo this one again thank you for reminding me

permalink
report
parent
reply
6 points

That one turns out to have been largely Microsoft’s fault for repeatedly ignoring warnings of a severe vulnerability relating to Active Directory. Microsoft were warned about it, acknowledged it and ignored it for years until it got used in the Solar Winds hack.

permalink
report
parent
reply
1 point

lesson not learned

permalink
report
parent
reply
81 points

security as a service is about to cost the world a pretty penny.

permalink
report
parent
reply
88 points

You mean it’s going to cost corporations a pretty penny. Which means they’ll pass those “costs of operation” on to the rest of us. Fuck.

permalink
report
parent
reply
31 points
*

well, the world does include the rest of us.

and its not just opeerational costs. what happens when an outage lasts 3+ days and affects all communication and travel? thats another massive shock to the system.

they come faster and faster.

permalink
report
parent
reply
7 points

You did not just fall out of a coconut tree. You exist in a context of all that came before you.

permalink
report
parent
reply
4 points

Either that or cyber instance

permalink
report
parent
reply
15 points

Where’s my fuckin raise

permalink
report
parent
reply
1 point

All the more reason for companies to ignore security until they’re affected personally. The companies I’ve worked for barely ever invested in future cost-savings.

permalink
report
parent
reply
36 points

On Monday I will once again be raising the point of not automatically updating software. Just because it’s being updated does not mean it’s better and does not mean we should be running it on production servers.

Of course they won’t listen to me but at least it’s been brought up.

permalink
report
parent
reply
14 points

Thank God someone else said it. I was constantly in an existential battle with IT at my last job when they were constantly forcing updates, many of which did actually break systems we rely on because Apple loves introducing breaking changes in OS updates (like completely fucking up how dynamic libraries work).

Updates should be vetted. It’s a pain in the ass to do because companies never provide an easy way to rollback, but this really should be standard practice.

permalink
report
parent
reply
1 point

You can use AirWatch to deal with Apple devices. Although it is a clunky program it does at least give you the ability to roll things back.

permalink
report
parent
reply
13 points
*

I thought it was a security definition download; as in, there’s nothing short of not connecting to the Internet that you can do about it.

permalink
report
parent
reply
6 points

Well I haven’t looked into it for this piece of software but essentially you can prevent automatic updates from applying to the network. Usually because the network is behind a firewall that you can use to block the update until you decide that you like it.

Also a lot of companies recognize that businesses like to check updates and so have more streamlined ways of doing it. For instance Apple have a whole dedicated update system for iOS devices that only businesses have access to where you can decide you don’t want the latest iOS and it’s easy you just don’t enable it and it doesn’t happen.

Regardless of the method, what should happen is you should download the update to a few testing computers (preferably also physically isolated from the main network) and run some basic checks to see if it works. In this case the testing computers would have blue screened instantly, and you would have known that this is not an update that you want on your system. Although usually requires a little bit more investigation to determine problems.

permalink
report
parent
reply
30 points
*

I’ve got a feeling crowdstrike won’t be as grand of target anymore. They’re sure to lose a lot of clients…at least until they spin up a new name and erease all traces of “crowdstrike”.

permalink
report
parent
reply
8 points

I don’t think they will lose any big clients. I am sure they will have insurance to take care of compensations.

permalink
report
parent
reply
7 points

That trick doesn’t work for B2B as organizations tend to do their research before buying. Consumers tend not to.

permalink
report
parent
reply
20 points

Third parties being able to push updates to production machines without being tested first is giant red flag for me. We’re human … we fuck up. I understand that. But that’s why you test things first.

I don’t trust myself without double checking, so why would we completely trust a third party so completely.

permalink
report
parent
reply
1 point
Deleted by creator
permalink
report
parent
reply
16 points

I’d assume state (or other serious) actors already know about these companies.

permalink
report
parent
reply
12 points
Removed by mod
permalink
report
parent
reply
5 points

Properly regulated capitalism breaks up monopolies so new players can enter the market. What you’re seeing is dysfunctional capitalism - an economy of monopolies.

permalink
report
parent
reply
2 points
*

Years ago I read an study about insurance companies and diversification of assets in Brazil. By regulation, an individual insurance company need to have a diversified investment portfolio, but the insurance market as a whole not. the diversification of every individual company sum, as a whole of all the insurance market, as an was exposed market, and the researchers found, iirc, like 3 banks that if they fail they can cause a chain reaction that would take out the entire insurance market.

Don’t know why, but your comment made me remind of that.

permalink
report
parent
reply
2 points
Removed by mod
permalink
report
parent
reply
2 points

Yeah the fact that this company calls it feature that they can push an update anytime without site level intervention is scary to me. If they ever did get compromised boom every device running their program suddenly has a kernel level malware essentially overnight.

permalink
report
parent
reply
240 points

Ah, a classic off by 43,008 zeroes error.

permalink
report
reply
152 points

If I had to bet my money, a bad machine with corrupted memory pushed the file at a very final stage of the release.

The astonishing fact is that for a security software I would expect all files being verified against a signature (that would have prevented this issue and some kinds of attacks

permalink
report
reply
51 points

So here’s my uneducated question: Don’t huge software companies like this usually do updates in “rollouts” to a small portion of users (companies) at a time?

permalink
report
parent
reply
35 points

I mean yes, but one of the issuess with “state of the art av” is they are trying to roll out updates faster than bad actors can push out code to exploit discovered vulnerabilities.

The code/config/software push may have worked on some test systems but MS is always changing things too.

permalink
report
parent
reply
8 points

Somone else said this wasn’t a case of this breaks on windows system version XXX with update YYY on a Tuesday at 12:24 pm when clock is set to eastern standard time. It literally breaks on ANY windows machine, instantly, on boot. There is no excuse for this.

permalink
report
parent
reply
28 points

the smart ones probably do

permalink
report
parent
reply
12 points

Companies don’t like to be beta testers. Apparently the solution is to just not test anything and call it production ready.

permalink
report
parent
reply
14 points

Every company has a full-scale test environment. Some companies are just lucky enough to have a separate prod environment.

permalink
report
parent
reply
5 points

That’s certainly what we do in my workplace. Shocked that they don’t.

permalink
report
parent
reply
2 points

When I worked at a different enterprise IT company, we published updates like this to our customers and strongly recommended they all have a dedicated pool of canary machines to test the update in their own environment first.

I wonder if CRWD advised their customers to do the same, or soft-pedaled the practice because it’s an admission there could be bugs in the updates.

I know the suggestion of keeping a stage environment was off putting to smaller customers.

permalink
report
parent
reply
51 points

Which is still unacceptable.

permalink
report
parent
reply
16 points

Windows kernel drivers are signed by Microsoft. They must have rubber stamped this for this to go through, though.

permalink
report
parent
reply
73 points

This was not the driver, it was a config file or something read by the driver. Now having a driver in kernel space depending on a config on a regular path is another fuck up

permalink
report
parent
reply
8 points

isn’t .sys a driver?

permalink
report
parent
reply
-12 points

What about the Mac and Linux PCs? Did Microsoft sign those too?

permalink
report
parent
reply
16 points

only the Windows version was affected

permalink
report
parent
reply
8 points

Not sure about Mac, but on Linux, they’re signed by the distro maintainer or with the computer’s secure boot key.

https://wiki.ubuntu.com/UEFI/SecureBoot

permalink
report
parent
reply
14 points
Removed by mod
permalink
report
parent
reply
11 points
*
Deleted by creator
permalink
report
parent
reply
4 points
Removed by mod
permalink
report
parent
reply
-1 points

Which is still unacceptable.

permalink
report
parent
reply
117 points

This file compresses so well. 🤏

permalink
report
reply
43 points

permalink
report
parent
reply
109 points

If it had been all ones this could have been avoided.

permalink
report
reply
57 points

Just needed to add 42k of ones to balance the data. Everyone knows that, like tires, you need to balance your data.

permalink
report
parent
reply
14 points

Apply the ones in a star shape to distribute pressure evenly

permalink
report
parent
reply
9 points

I mean, joking aside, isn’t that how parity calculations used to work? “Got more uppy bits than downy bits - that’s a paddlin’” or something.

permalink
report
parent
reply
7 points
*

Assuming they were all calculations, which they won’t have been.

We will probably never know for sure, because the company will never actually release a postmortem, but I suspect that the file was essentially just treated as unreadable, and didn’t actually do anything. The problem will have been that important bits of code, that should have been in there, now no longer existed.

You would have thought they’d do some testing before releasing an update wouldn’t you. I’m sure their software developers have a bright future at Boeing ahead of them. Although in fairness to them, this will almost certainly have been a management decision.

permalink
report
parent
reply
6 points

I once had a very noisy computer… It was the disk! I just balanced the data and all problems went away.

permalink
report
parent
reply
2 points

Perfectly balanced

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 18K

    Monthly active users

  • 12K

    Posts

  • 538K

    Comments