this post was submitted on 19 Jul 2024
819 points (98.5% liked)

Technology

59187 readers
2182 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

…according to a Twitter post by the Chief Informational Security Officer of Grand Canyon Education.

So, does anyone else find it odd that the file that caused everything CrowdStrike to freak out, C-00000291-
00000000-00000032.sys was 42KB of blank/null values, while the replacement file C-00000291-00000000-
00000.033.sys was 35KB and looked like a normal, if not obfuscated sys/.conf file?

Also, apparently CrowdStrike had at least 5 hours to work on the problem between the time it was discovered and the time it was fixed.

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 392 points 3 months ago* (last edited 3 months ago) (21 children)

Every affected company should be extremely thankful that this was an accidental bug, because if crowdstrike gets hacked, it means the bad actors could basically ransom I don't know how many millions of computers overnight

Not to mention that crowdstrike will now be a massive target from hackers trying to do exactly this

[–] [email protected] 219 points 3 months ago (4 children)
[–] [email protected] 84 points 3 months ago (1 children)
[–] [email protected] 52 points 3 months ago

New vulnerability just dropped

[–] [email protected] 22 points 3 months ago

Oooooooo this one again thank you for reminding me

load more comments (2 replies)
[–] [email protected] 80 points 3 months ago (3 children)

security as a service is about to cost the world a pretty penny.

[–] [email protected] 87 points 3 months ago (3 children)

You mean it's going to cost corporations a pretty penny. Which means they'll pass those "costs of operation" on to the rest of us. Fuck.

[–] [email protected] 32 points 3 months ago* (last edited 3 months ago)

well, the world does include the rest of us.

and its not just opeerational costs. what happens when an outage lasts 3+ days and affects all communication and travel? thats another massive shock to the system.

they come faster and faster.

load more comments (2 replies)
load more comments (2 replies)
[–] [email protected] 36 points 3 months ago (8 children)

On Monday I will once again be raising the point of not automatically updating software. Just because it's being updated does not mean it's better and does not mean we should be running it on production servers.

Of course they won't listen to me but at least it's been brought up.

load more comments (8 replies)
[–] [email protected] 30 points 3 months ago* (last edited 3 months ago) (2 children)

I've got a feeling crowdstrike won't be as grand of target anymore. They're sure to lose a lot of clients...at least until they spin up a new name and erease all traces of "crowdstrike".

load more comments (2 replies)
[–] [email protected] 20 points 3 months ago (1 children)

Third parties being able to push updates to production machines without being tested first is giant red flag for me. We’re human … we fuck up. I understand that. But that’s why you test things first.

I don’t trust myself without double checking, so why would we completely trust a third party so completely.

load more comments (1 replies)
load more comments (16 replies)
[–] [email protected] 238 points 3 months ago (1 children)

Ah, a classic off by 43,008 zeroes error.

[–] [email protected] 149 points 3 months ago (24 children)

If I had to bet my money, a bad machine with corrupted memory pushed the file at a very final stage of the release.

The astonishing fact is that for a security software I would expect all files being verified against a signature (that would have prevented this issue and some kinds of attacks

[–] [email protected] 51 points 3 months ago

Which is still unacceptable.

[–] [email protected] 50 points 3 months ago (8 children)

So here's my uneducated question: Don't huge software companies like this usually do updates in "rollouts" to a small portion of users (companies) at a time?

[–] [email protected] 34 points 3 months ago (1 children)

I mean yes, but one of the issuess with "state of the art av" is they are trying to roll out updates faster than bad actors can push out code to exploit discovered vulnerabilities.

The code/config/software push may have worked on some test systems but MS is always changing things too.

load more comments (1 replies)
[–] [email protected] 28 points 3 months ago

the smart ones probably do

load more comments (6 replies)
load more comments (22 replies)
[–] [email protected] 116 points 3 months ago (1 children)

This file compresses so well. 🤏

[–] [email protected] 109 points 3 months ago (1 children)

If it had been all ones this could have been avoided.

[–] [email protected] 56 points 3 months ago (5 children)

Just needed to add 42k of ones to balance the data. Everyone knows that, like tires, you need to balance your data.

load more comments (5 replies)
[–] [email protected] 69 points 3 months ago* (last edited 3 months ago) (2 children)
d'00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000!
[–] [email protected] 23 points 3 months ago* (last edited 3 months ago)

Damnit you're comment just crashed the rest of the computers that were still up.

load more comments (1 replies)
[–] [email protected] 44 points 3 months ago (1 children)

Imagine the world if those companies were using Atomic distribution and the only thing you would need to do is to boot the previous good image.

load more comments (1 replies)
[–] [email protected] 36 points 3 months ago (11 children)

The fact that a single bad file can cause a kernel panic like this tells you everything you need to know about using this kind of integrated security product. Crowdstrike is apparently a rootkit, and windows apparently has zero execution integrity.

[–] [email protected] 48 points 3 months ago

I’m not sure why you think this statement is so profound.

CrowdStrike is expected to have kernel level access to operate correctly. Kernel level exceptions cause these types of errors.

Windows handles exceptions just fine when code is run in user space.

This is how nearly all computers operate.

[–] [email protected] 31 points 3 months ago (2 children)

This is a pretty hot take. A single bad file can topple pretty much any operating system depending on what the file is. That's part of why it's important to be able to detect file corruption in a mission critical system.

load more comments (2 replies)
[–] [email protected] 23 points 3 months ago (2 children)

Security products of this nature need to be tight with the kernel in order to actually be effective (and prevent actual rootkits).

That said, the old mantra of "with great power" comes to mind...

load more comments (2 replies)
[–] [email protected] 22 points 3 months ago (4 children)

Yeah pretty much all security products need kernel level access unfortunately. The Linux ones including crowdstrike and also the Open Source tools SELinux and AppArmor all need some kind of kernel module in order to work.

load more comments (4 replies)
load more comments (7 replies)
[–] [email protected] 25 points 3 months ago (6 children)

have they ruled out any possibility of a man in the middle attack by a foreign actor?

[–] [email protected] 62 points 3 months ago (1 children)

This was not a cyberattack.

https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/

I guess they could be lying, but if they were lying, I don’t know if their argument of “we’re incompetent” is instilling more trust in them.

[–] [email protected] 30 points 3 months ago

"We are confident that only our engineers can fuck up so much, instead of our competitors"

[–] [email protected] 53 points 3 months ago

The CEO made a statement to the effect of "It's not an attack, it's just me and my company being shockingly incompetent." He didn't use exactly those words but that was the gist.

load more comments (4 replies)
[–] [email protected] 22 points 3 months ago (11 children)

How can all of those zeroes cause a major OS crash?

[–] [email protected] 212 points 3 months ago (35 children)

If I send you on stage at the Olympic Games opening ceremony with a sealed envelope

And I say "This contains your script, just open it and read it"

And then when you open it, the script is blank

You're gonna freak out

[–] [email protected] 42 points 3 months ago (9 children)

Ah, makes sense. I guess a driver would completely freak out if that file gave no instructions and was just like "..."

load more comments (9 replies)
load more comments (34 replies)
[–] [email protected] 58 points 3 months ago (2 children)

Because it's supposed to be something else

[–] [email protected] 35 points 3 months ago (1 children)

At least a few 1's I imagine.

[–] [email protected] 29 points 3 months ago (2 children)
load more comments (1 replies)
load more comments (9 replies)
load more comments
view more: next ›