this post was submitted on 19 Jul 2024
829 points (98.6% liked)

Technology

60047 readers
2829 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
 

…according to a Twitter post by the Chief Informational Security Officer of Grand Canyon Education.

So, does anyone else find it odd that the file that caused everything CrowdStrike to freak out, C-00000291-
00000000-00000032.sys was 42KB of blank/null values, while the replacement file C-00000291-00000000-
00000.033.sys was 35KB and looked like a normal, if not obfuscated sys/.conf file?

Also, apparently CrowdStrike had at least 5 hours to work on the problem between the time it was discovered and the time it was fixed.

you are viewing a single comment's thread
view the rest of the comments
[–] independantiste 397 points 5 months ago* (last edited 5 months ago) (8 children)

Every affected company should be extremely thankful that this was an accidental bug, because if crowdstrike gets hacked, it means the bad actors could basically ransom I don't know how many millions of computers overnight

Not to mention that crowdstrike will now be a massive target from hackers trying to do exactly this

[–] [email protected] 223 points 5 months ago (4 children)
[–] planish 86 points 5 months ago (1 children)
[–] [email protected] 53 points 5 months ago

New vulnerability just dropped

[–] [email protected] 22 points 5 months ago

Oooooooo this one again thank you for reminding me

[–] [email protected] 6 points 5 months ago

That one turns out to have been largely Microsoft's fault for repeatedly ignoring warnings of a severe vulnerability relating to Active Directory. Microsoft were warned about it, acknowledged it and ignored it for years until it got used in the Solar Winds hack.

[–] [email protected] 1 points 5 months ago

lesson not learned

[–] [email protected] 81 points 5 months ago (3 children)

security as a service is about to cost the world a pretty penny.

[–] [email protected] 87 points 5 months ago (3 children)

You mean it's going to cost corporations a pretty penny. Which means they'll pass those "costs of operation" on to the rest of us. Fuck.

[–] [email protected] 32 points 5 months ago* (last edited 5 months ago)

well, the world does include the rest of us.

and its not just opeerational costs. what happens when an outage lasts 3+ days and affects all communication and travel? thats another massive shock to the system.

they come faster and faster.

[–] [email protected] 7 points 5 months ago

You did not just fall out of a coconut tree. You exist in a context of all that came before you.

[–] [email protected] 4 points 5 months ago

Either that or cyber instance

[–] [email protected] 15 points 5 months ago

Where's my fuckin raise

[–] [email protected] 1 points 5 months ago

All the more reason for companies to ignore security until they're affected personally. The companies I've worked for barely ever invested in future cost-savings.

[–] [email protected] 36 points 5 months ago (2 children)

On Monday I will once again be raising the point of not automatically updating software. Just because it's being updated does not mean it's better and does not mean we should be running it on production servers.

Of course they won't listen to me but at least it's been brought up.

[–] [email protected] 14 points 5 months ago (1 children)

Thank God someone else said it. I was constantly in an existential battle with IT at my last job when they were constantly forcing updates, many of which did actually break systems we rely on because Apple loves introducing breaking changes in OS updates (like completely fucking up how dynamic libraries work).

Updates should be vetted. It's a pain in the ass to do because companies never provide an easy way to rollback, but this really should be standard practice.

[–] [email protected] 1 points 5 months ago

You can use AirWatch to deal with Apple devices. Although it is a clunky program it does at least give you the ability to roll things back.

[–] shield_gengar 13 points 5 months ago* (last edited 5 months ago) (1 children)

I thought it was a security definition download; as in, there's nothing short of not connecting to the Internet that you can do about it.

[–] [email protected] 6 points 5 months ago (1 children)

Well I haven't looked into it for this piece of software but essentially you can prevent automatic updates from applying to the network. Usually because the network is behind a firewall that you can use to block the update until you decide that you like it.

Also a lot of companies recognize that businesses like to check updates and so have more streamlined ways of doing it. For instance Apple have a whole dedicated update system for iOS devices that only businesses have access to where you can decide you don't want the latest iOS and it's easy you just don't enable it and it doesn't happen.

Regardless of the method, what should happen is you should download the update to a few testing computers (preferably also physically isolated from the main network) and run some basic checks to see if it works. In this case the testing computers would have blue screened instantly, and you would have known that this is not an update that you want on your system. Although usually requires a little bit more investigation to determine problems.

[–] [email protected] 30 points 5 months ago* (last edited 5 months ago) (2 children)

I've got a feeling crowdstrike won't be as grand of target anymore. They're sure to lose a lot of clients...at least until they spin up a new name and erease all traces of "crowdstrike".

[–] [email protected] 8 points 5 months ago

I don't think they will lose any big clients. I am sure they will have insurance to take care of compensations.

[–] [email protected] 7 points 5 months ago

That trick doesn't work for B2B as organizations tend to do their research before buying. Consumers tend not to.

[–] [email protected] 20 points 5 months ago (1 children)

Third parties being able to push updates to production machines without being tested first is giant red flag for me. We’re human … we fuck up. I understand that. But that’s why you test things first.

I don’t trust myself without double checking, so why would we completely trust a third party so completely.

[–] [email protected] 16 points 5 months ago

I'd assume state (or other serious) actors already know about these companies.

[–] Pika 2 points 5 months ago

Yeah the fact that this company calls it feature that they can push an update anytime without site level intervention is scary to me. If they ever did get compromised boom every device running their program suddenly has a kernel level malware essentially overnight.