…according to a Twitter post by the Chief Informational Security Officer of Grand Canyon Education.

So, does anyone else find it odd that the file that caused everything CrowdStrike to freak out, C-00000291-
00000000-00000032.sys was 42KB of blank/null values, while the replacement file C-00000291-00000000-
00000.033.sys was 35KB and looked like a normal, if not obfuscated sys/.conf file?

Also, apparently CrowdStrike had at least 5 hours to work on the problem between the time it was discovered and the time it was fixed.

  • Pasta Dental@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    4 months ago

    Every affected company should be extremely thankful that this was an accidental bug, because if crowdstrike gets hacked, it means the bad actors could basically ransom I don’t know how many millions of computers overnight

    Not to mention that crowdstrike will now be a massive target from hackers trying to do exactly this

    • Echo Dot@feddit.uk
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      On Monday I will once again be raising the point of not automatically updating software. Just because it’s being updated does not mean it’s better and does not mean we should be running it on production servers.

      Of course they won’t listen to me but at least it’s been brought up.

      • ShieldGengar@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        4 months ago

        I thought it was a security definition download; as in, there’s nothing short of not connecting to the Internet that you can do about it.

        • Echo Dot@feddit.uk
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          Well I haven’t looked into it for this piece of software but essentially you can prevent automatic updates from applying to the network. Usually because the network is behind a firewall that you can use to block the update until you decide that you like it.

          Also a lot of companies recognize that businesses like to check updates and so have more streamlined ways of doing it. For instance Apple have a whole dedicated update system for iOS devices that only businesses have access to where you can decide you don’t want the latest iOS and it’s easy you just don’t enable it and it doesn’t happen.

          Regardless of the method, what should happen is you should download the update to a few testing computers (preferably also physically isolated from the main network) and run some basic checks to see if it works. In this case the testing computers would have blue screened instantly, and you would have known that this is not an update that you want on your system. Although usually requires a little bit more investigation to determine problems.

          • Angry_Autist (he/him)@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 months ago

            It makes me so fuckdamn angry that people make this assumption.

            This Crowdstrike update was NOT pausable. You cannot disable updates without disabling the service as they get fingerprint files nearly every day.

            • lando55@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              4 months ago

              I hear you, but there’s no reason to be angry.

              When I first learned of the issue, my first thought was, “Hey our update policy doesn’t pull the latest sensor to production servers.” After a little more research I came to the same conclusion you did, aside from disconnecting from the internet there’s nothing we really could have done.

              There will always be armchair quarterbacks, use this as an opportunity to teach, life’s too short to be upset about such things.

    • Angry_Autist (he/him)@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      This is why I openly advocate for a diverse ecosystems of services, so not everyone is affected if the biggest gets targeted.

      But unfortunately, capitalism favors only the frontrunner and everyone else can go spin, and we aren’t getting rid of capitalism anytime soon.

      So basically, it is inevitable that crowdstrike WILL be hacked, and the next time will be much much worse.

      • Cryophilia@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Properly regulated capitalism breaks up monopolies so new players can enter the market. What you’re seeing is dysfunctional capitalism - an economy of monopolies.

        • Angry_Autist (he/him)@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          Sorry no, capitalism is working exactly as intended. Concentration of wealth breaks regulation with unlimited political donations.

          You call it unregulated, but that is the natural trend for when the only acceptable goal is the greater accumulation of wealth. There comes a time when that wealth is financially best spent buying politicians.

          Until there are inherent mechanisms within capitalism to prevent special interest money from pushing policy and direct regulatory capture, capitalism will ALWAYS trend to deregulation.

          • Cryophilia@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 months ago

            You call it unregulated, but that is the natural trend for when the only acceptable goal is the greater accumulation of wealth.

            Yes…obviously.

            And that IS dysfunctional capitalism.

            Until there are inherent mechanisms within capitalism to prevent special interest money from pushing policy and direct regulatory capture

            That’s exactly what I’m saying, dude.

            This is NOT capitalism working as intended. This is broken capitalism. Runaway capitalism. Corrupt capitalism.

            • hglman@lemmy.ml
              link
              fedilink
              English
              arrow-up
              0
              ·
              4 months ago

              Its like saying we just need good kings, no ids a bad system. Any capitalist system will devolve in corruption and monopoly. No regulations can survive the unavailable regulatory capture and corruption.

  • diffusive@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    4 months ago

    If I had to bet my money, a bad machine with corrupted memory pushed the file at a very final stage of the release.

    The astonishing fact is that for a security software I would expect all files being verified against a signature (that would have prevented this issue and some kinds of attacks

    • BossDj@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      So here’s my uneducated question: Don’t huge software companies like this usually do updates in “rollouts” to a small portion of users (companies) at a time?

      • Dashi@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 months ago

        I mean yes, but one of the issuess with “state of the art av” is they are trying to roll out updates faster than bad actors can push out code to exploit discovered vulnerabilities.

        The code/config/software push may have worked on some test systems but MS is always changing things too.

      • Echo Dot@feddit.uk
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Companies don’t like to be beta testers. Apparently the solution is to just not test anything and call it production ready.

        • JasonDJ@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 months ago

          Every company has a full-scale test environment. Some companies are just lucky enough to have a separate prod environment.

    • Angry_Autist (he/him)@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      From my experience it was more likely to be an accidental overwrite from human error with recent policy changes that removed vetting steps.

        • Angry_Autist (he/him)@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 months ago

          Quick development will probably spell the end of the internet once AI code creation hits its stride. It’ll be like the most topheavy SCRUM you’ve ever seen with the devs literally incapable of disagreeing.

          I was thinking about his stint at McAfee, and I think you’re right. My real question is: will the next company he golden parachutes off to learn the lesson?

          I’m going to bet not.

  • yokonzo@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    4 months ago

    I’m not a dev, but don’t they have like a/b updates or at least test their updates in a sandbox before releasing them?

    • kalleboo@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      4 months ago

      It could have been the release process itself that was bugged. The actual update that was supposed to go out was tested and worked, then the upload was corrupted/failed. They need to add tests on the actual released version instead of a local copy.

      • FiniteBanjo@lemmy.today
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        1
        ·
        4 months ago

        Could also be that the Windows versions they tested on weren’t as problematic as the updated drivers around the time they released.

  • Socsa@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 months ago

    The fact that a single bad file can cause a kernel panic like this tells you everything you need to know about using this kind of integrated security product. Crowdstrike is apparently a rootkit, and windows apparently has zero execution integrity.

    • Dark Arc@social.packetloss.gg
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      4 months ago

      This is a pretty hot take. A single bad file can topple pretty much any operating system depending on what the file is. That’s part of why it’s important to be able to detect file corruption in a mission critical system.

      • Dave.@aussie.zone
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        4 months ago

        This was a binary configuration file of some sort though?

        Something along the lines of:

        IF (config.parameter.read == garbage) {
             Dont_panic;
        }
        

        Would have helped greatly here.

        Edit: oh it’s more like an unsigned binary blob that gets downloaded and directly executed. What could possibly go wrong with that approach?

    • OutsizedWalrus@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 months ago

      I’m not sure why you think this statement is so profound.

      CrowdStrike is expected to have kernel level access to operate correctly. Kernel level exceptions cause these types of errors.

      Windows handles exceptions just fine when code is run in user space.

      This is how nearly all computers operate.

    • areyouevenreal@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      Yeah pretty much all security products need kernel level access unfortunately. The Linux ones including crowdstrike and also the Open Source tools SELinux and AppArmor all need some kind of kernel module in order to work.

      • reddithalation@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 months ago

        crowdstrike has caused issues like this with linux systems in the past, but sounds like they have now moved to eBPF user mode by default (I don’t know enough about low level linux to understand that though haha), and it now can’t crash the whole computer. source

        • areyouevenreal@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 months ago

          As explained in that source eBPF code is still running in kernel space. The difference is it’s not turing complete and has protections in place to make sure it can’t do anything too nasty. That being said I am sure you could still break something like networking or critical services on the system by applying the wrong eBPF code. It’s on the authors of the software to make sure they thoroughly test and review their software prior to release if it’s designed to work with the kernel especially in enterprise environments. I am glad this is something they are doing though.

      • uis@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        At least SELinux doesn’t crash on bad config file

        • areyouevenreal@lemm.ee
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          4 months ago

          I am not praising crowdstrike here. They fucked up big time. I am saying that the concept of security software needing kernel access isn’t that unheard of, and is unfortunately necessary for a reason. There is only so much a security thing can do without that kernel level access.

    • phx@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      Security products of this nature need to be tight with the kernel in order to actually be effective (and prevent actual rootkits).

      That said, the old mantra of “with great power” comes to mind…

    • jj4211@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      Just needed to add 42k of ones to balance the data. Everyone knows that, like tires, you need to balance your data.

    • tiramichu@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      If I send you on stage at the Olympic Games opening ceremony with a sealed envelope

      And I say “This contains your script, just open it and read it”

      And then when you open it, the script is blank

      You’re gonna freak out

      • Gork@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Ah, makes sense. I guess a driver would completely freak out if that file gave no instructions and was just like “…”

          • planish@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 months ago

            That’s what the BSOD is. It tries to bring the system back to a nice safe freshly-booted state where e.g. the fans are running and the GPU is not happily drawing several kilowatts and trying to catch fire.

              • Windows assumes that you installed that AV for a reason. If it suddenly faults, who’s to say it’s a bug and not some virus going ham on the AV? A BSOD is the most graceful exit you could do, ignoring and booting a potentially compromised system is a fairly big no-no (especially in systems that feel the need to install AV like this in the first place).

      • Imgonnatrythis@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Maybe. But I’d like to think I’d just say something clever like, “says here that this year the pummel horse will be replaced by yours truly!”

        • Takios@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          Problem is that software cannot deal with unexpected situations like a human brain can. Computers do exactly what a programmer tells it to do, nothing more nothing less. So if a situation arises that the programmer hasn’t written code for, then there will be a crash.