this post was submitted on 19 Jul 2024
830 points (98.5% liked)

Technology

59534 readers
3195 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

…according to a Twitter post by the Chief Informational Security Officer of Grand Canyon Education.

So, does anyone else find it odd that the file that caused everything CrowdStrike to freak out, C-00000291-
00000000-00000032.sys was 42KB of blank/null values, while the replacement file C-00000291-00000000-
00000.033.sys was 35KB and looked like a normal, if not obfuscated sys/.conf file?

Also, apparently CrowdStrike had at least 5 hours to work on the problem between the time it was discovered and the time it was fixed.

top 50 comments
sorted by: hot top controversial new old
[–] independantiste@sh.itjust.works 396 points 4 months ago* (last edited 4 months ago) (21 children)

Every affected company should be extremely thankful that this was an accidental bug, because if crowdstrike gets hacked, it means the bad actors could basically ransom I don't know how many millions of computers overnight

Not to mention that crowdstrike will now be a massive target from hackers trying to do exactly this

[–] Evotech@lemmy.world 223 points 4 months ago (4 children)
[–] planish@sh.itjust.works 86 points 4 months ago (1 children)
[–] SomethingBurger@jlai.lu 53 points 4 months ago

New vulnerability just dropped

[–] peopleproblems@lemmy.world 22 points 4 months ago

Oooooooo this one again thank you for reminding me

load more comments (2 replies)
[–] qprimed@lemmy.ml 81 points 4 months ago (3 children)

security as a service is about to cost the world a pretty penny.

[–] Telorand@reddthat.com 87 points 4 months ago (3 children)

You mean it's going to cost corporations a pretty penny. Which means they'll pass those "costs of operation" on to the rest of us. Fuck.

[–] qprimed@lemmy.ml 32 points 4 months ago* (last edited 4 months ago)

well, the world does include the rest of us.

and its not just opeerational costs. what happens when an outage lasts 3+ days and affects all communication and travel? thats another massive shock to the system.

they come faster and faster.

load more comments (2 replies)
load more comments (2 replies)
[–] echodot@feddit.uk 36 points 4 months ago (8 children)

On Monday I will once again be raising the point of not automatically updating software. Just because it's being updated does not mean it's better and does not mean we should be running it on production servers.

Of course they won't listen to me but at least it's been brought up.

load more comments (8 replies)
[–] helpImTrappedOnline@lemmy.world 30 points 4 months ago* (last edited 4 months ago) (2 children)

I've got a feeling crowdstrike won't be as grand of target anymore. They're sure to lose a lot of clients...at least until they spin up a new name and erease all traces of "crowdstrike".

load more comments (2 replies)
[–] billwashere@lemmy.world 20 points 4 months ago (1 children)

Third parties being able to push updates to production machines without being tested first is giant red flag for me. We’re human … we fuck up. I understand that. But that’s why you test things first.

I don’t trust myself without double checking, so why would we completely trust a third party so completely.

load more comments (1 replies)
load more comments (16 replies)
[–] bjoern_tantau@swg-empire.de 240 points 4 months ago (1 children)

Ah, a classic off by 43,008 zeroes error.

[–] diffusive@lemmy.world 151 points 4 months ago (24 children)

If I had to bet my money, a bad machine with corrupted memory pushed the file at a very final stage of the release.

The astonishing fact is that for a security software I would expect all files being verified against a signature (that would have prevented this issue and some kinds of attacks

[–] LodeMike@lemmy.today 51 points 4 months ago

Which is still unacceptable.

[–] BossDj@lemm.ee 51 points 4 months ago (8 children)

So here's my uneducated question: Don't huge software companies like this usually do updates in "rollouts" to a small portion of users (companies) at a time?

[–] Dashi@lemmy.world 35 points 4 months ago (1 children)

I mean yes, but one of the issuess with "state of the art av" is they are trying to roll out updates faster than bad actors can push out code to exploit discovered vulnerabilities.

The code/config/software push may have worked on some test systems but MS is always changing things too.

load more comments (1 replies)
[–] umbrella@lemmy.ml 28 points 4 months ago

the smart ones probably do

load more comments (6 replies)
load more comments (22 replies)
[–] tofubl@discuss.tchncs.de 117 points 4 months ago (1 children)

This file compresses so well. 🤏

[–] some_guy@lemmy.sdf.org 109 points 4 months ago (1 children)

If it had been all ones this could have been avoided.

[–] jj4211@lemmy.world 57 points 4 months ago (5 children)

Just needed to add 42k of ones to balance the data. Everyone knows that, like tires, you need to balance your data.

load more comments (5 replies)
[–] EleventhHour@lemmy.world 69 points 4 months ago* (last edited 4 months ago) (2 children)
d'00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000!
[–] jj4211@lemmy.world 23 points 4 months ago* (last edited 4 months ago)

Damnit you're comment just crashed the rest of the computers that were still up.

load more comments (1 replies)
[–] filister@lemmy.world 44 points 4 months ago (1 children)

Imagine the world if those companies were using Atomic distribution and the only thing you would need to do is to boot the previous good image.

load more comments (1 replies)
[–] Socsa@sh.itjust.works 37 points 4 months ago (11 children)

The fact that a single bad file can cause a kernel panic like this tells you everything you need to know about using this kind of integrated security product. Crowdstrike is apparently a rootkit, and windows apparently has zero execution integrity.

[–] OutsizedWalrus@lemmy.world 50 points 4 months ago

I’m not sure why you think this statement is so profound.

CrowdStrike is expected to have kernel level access to operate correctly. Kernel level exceptions cause these types of errors.

Windows handles exceptions just fine when code is run in user space.

This is how nearly all computers operate.

[–] Dark_Arc@social.packetloss.gg 35 points 4 months ago (2 children)

This is a pretty hot take. A single bad file can topple pretty much any operating system depending on what the file is. That's part of why it's important to be able to detect file corruption in a mission critical system.

load more comments (2 replies)
[–] phx@lemmy.ca 24 points 4 months ago (2 children)

Security products of this nature need to be tight with the kernel in order to actually be effective (and prevent actual rootkits).

That said, the old mantra of "with great power" comes to mind...

load more comments (2 replies)
[–] areyouevenreal@lemm.ee 23 points 4 months ago (4 children)

Yeah pretty much all security products need kernel level access unfortunately. The Linux ones including crowdstrike and also the Open Source tools SELinux and AppArmor all need some kind of kernel module in order to work.

load more comments (4 replies)
load more comments (7 replies)
[–] cupcakezealot@lemmy.blahaj.zone 25 points 4 months ago (6 children)

have they ruled out any possibility of a man in the middle attack by a foreign actor?

[–] simplejack@lemmy.world 62 points 4 months ago (1 children)

This was not a cyberattack.

https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/

I guess they could be lying, but if they were lying, I don’t know if their argument of “we’re incompetent” is instilling more trust in them.

[–] xavier666@lemm.ee 30 points 4 months ago

"We are confident that only our engineers can fuck up so much, instead of our competitors"

[–] floofloof@lemmy.ca 53 points 4 months ago

The CEO made a statement to the effect of "It's not an attack, it's just me and my company being shockingly incompetent." He didn't use exactly those words but that was the gist.

load more comments (4 replies)
[–] Gork@lemm.ee 22 points 4 months ago (11 children)

How can all of those zeroes cause a major OS crash?

[–] tiramichu@lemm.ee 212 points 4 months ago (29 children)

If I send you on stage at the Olympic Games opening ceremony with a sealed envelope

And I say "This contains your script, just open it and read it"

And then when you open it, the script is blank

You're gonna freak out

[–] Gork@lemm.ee 42 points 4 months ago (9 children)

Ah, makes sense. I guess a driver would completely freak out if that file gave no instructions and was just like "..."

load more comments (9 replies)
[–] deadbeef79000@lemmy.nz 17 points 4 months ago (8 children)

Except "freak out" could have various manifestations.

In this case it was "burn down the venue".

It should have been "I'm sorry, there's been an issue, let's move on to the next speaker"

load more comments (8 replies)
load more comments (27 replies)
[–] MajinBlayze@lemmy.world 58 points 4 months ago (2 children)

Because it's supposed to be something else

[–] jared@mander.xyz 35 points 4 months ago (1 children)

At least a few 1's I imagine.

[–] Iheartcheese@lemmy.world 29 points 4 months ago (2 children)
load more comments (1 replies)
load more comments (9 replies)
load more comments
view more: next ›