this post was submitted on 19 Jul 2024
523 points (99.2% liked)

Technology

60071 readers
4967 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 147 points 5 months ago (1 children)

This is why you do staged rollouts of updates... not the entire planet at once.

[–] [email protected] 70 points 5 months ago (16 children)

And don't have automatic updates enabled for critical infrastructure.

[–] [email protected] 21 points 5 months ago (1 children)

So true, this really highlights the risk of updates impacting critical systems vs critical systems being exposed to critical vulnerabilities. Its a real balancing act.

load more comments (1 replies)
[–] [email protected] 13 points 5 months ago

I don't know exactly how crowd strike works, but this sounded like a "virus signatures" update (IE not a software update per se). And thats what caused the issue.

I think "real time virus protection" is why people use it so they expect the signatures to get updated asap/with little to no human intervention.

This is a crowd strike epic fail...for how they let their software blue screen systems with a virus signature update.

load more comments (14 replies)
[–] [email protected] 95 points 5 months ago (3 children)

Can someone in non marketing terms explain what the fuck CrowdStrike Falcon Sensor is? I literally never heard of this company or product before.

[–] [email protected] 111 points 5 months ago (10 children)

It's basically corporate anti-virus software. Intended to detect and prevent malware.

[–] [email protected] 29 points 5 months ago (3 children)

Apparently it's the next iteration of AI based antivirus where it uses smart algorithms to detect system behaviours and makes assessments on whether they're malicious or not

[–] [email protected] 35 points 5 months ago

Apparently it's the next iteration of AI based antivirus

CrowdskyStrikenet

[–] [email protected] 26 points 5 months ago (4 children)

I know there is a lot of marketing fluff, but yes, it is an EDR. Which means instead of just checking file signatures against a database if known bad stuff, it actually examines what applications do and makes a sort of judgement on if it is acting maliciously or not. I use a similar product. Although the false positives can sometimes be baffling, it honestly can catch a legit program misbehaving.

On top of that, everything is logged. Every file, network connection, or registry key that every process on the computer touches is logged. That means when something happens, you can see the full and complete list of actions taken by the malicious system. Thus can actually be a drain on the computer, but modern systems handle it well enough.

load more comments (4 replies)
[–] [email protected] 4 points 5 months ago

obviously, A.I consider microsoft as a malicious software. Sometimes, A.I is very accurate 😁

load more comments (9 replies)
[–] [email protected] 68 points 5 months ago (2 children)

It checks for malicious falcons in your system's level 4 aviary cache.

[–] [email protected] 4 points 5 months ago

It's software put on every machine so that the company can quickly isolate it if/when something bad happens (or it falls out of security compliance). To do this is requires a constant Internet connection, insanely high privileges on the machine and frequent updates to be appraised of risks.

That risk update went off the rails and into the next state.

[–] [email protected] 64 points 5 months ago

I work in QA on the night shift at a video game company. It was absolute chaos at work tonight lmao we only had a grand total of 6 working PCs between all of us

[–] [email protected] 52 points 5 months ago* (last edited 5 months ago) (1 children)

Company spyware. We have that on our devices. They used to have an “about” stored locally on the app, but removed it and a web connection is required to view the docs. Basically says it downloads/sees everything on your device and checks for threats. Thing is a few people have been fired for having things in their devices they shouldn’t. I didn’t ask what it was, nor did I hear how these things were “threats”, but nonetheless they were fired. Too many people treat company hardware like “free device, bro!” and put all sorts of personal stuff on the device. Most industries it’s probably not too big of a deal, but for mine if there’s an incident that happens when you were busy watching Netflix or something instead of doing your job you’re fucked. First thing they’ll do is check your device and crowdstrike to see what you were doing, and even if you weren't watching Netflix all your personal data will be exposed.

[–] [email protected] 20 points 5 months ago

They definitely could, but most cybersecurity departments are paid too much to worry about minor items like that. If HR tells us to look into a specific user and gets the proper approvals so that everything is in compliance, we'll definitely get someone on the team to do it, but otherwise if we happen to see evidence of unapproved usage, we're mostly going to overlook it unless it could lead to something dangerous to your machine or the company as a whole.

EDRs like Crowdstrike can see very very nearly everything you do though, definitely everything you would care about.

[–] [email protected] 49 points 5 months ago (2 children)

Yikes. I feel sorry for all the help desk and support staff that has to deal with this chaotic mess all day.

[–] [email protected] 31 points 5 months ago (2 children)
[–] [email protected] 15 points 5 months ago (2 children)

What kind of criminally incompetent psychopath rolls out a global update on a fucking Friday afternoon?

Is the CEO of CrowdStrike Satan?

[–] [email protected] 12 points 5 months ago

They push updates every day. Attackers don't take Fridays off.

load more comments (1 replies)
load more comments (1 replies)
[–] [email protected] 7 points 5 months ago

Yup, my phone is nonstop going off with slack messages and tickets. Time to mute it for now

[–] [email protected] 34 points 5 months ago (1 children)

What a striking name... CrowdStrike heh. They definitely live up to it!

[–] [email protected] 3 points 5 months ago

More like CrashStrike

[–] [email protected] 31 points 5 months ago (4 children)

This is going to turn out it was a hack in several months right?

[–] [email protected] 53 points 5 months ago (6 children)

Won't take that long, security researchers are already decompiling the update to see if it was malicious or incompetence.

[–] [email protected] 26 points 5 months ago (1 children)

This is going to be Solarwinds all over again I can just smell it.

[–] [email protected] 15 points 5 months ago (2 children)
[–] [email protected] 4 points 5 months ago

Source: xkcd - "Dependency" - https://xkcd.com/2347/

load more comments (1 replies)
load more comments (5 replies)
[–] [email protected] 50 points 5 months ago (3 children)

Hacks of this grade tend to be targeted, this is most likely incompetence.

[–] [email protected] 5 points 5 months ago* (last edited 5 months ago) (1 children)

A lot of companies will get calls from the "provider" offering help with mitigation so that additional features can also be installed. This is a time to be extra wary.

Edited: spelling

load more comments (2 replies)
[–] [email protected] 15 points 5 months ago (3 children)

Never attribute to maliciousness that which can be explained by incompetence.

That said, I'm sure the Crowdstrike CEO is currently on a phone call with three of their pet Congresscritters asking if they can get a $100M grant to harden their systems against Russia/China/NKorea/Antifa interference right now.

[–] [email protected] 10 points 5 months ago (1 children)

"Senator, we were hacked by gay furries."

[–] [email protected] 6 points 5 months ago

"We need to get more of our own gay furries! There's a gay furry gap!"

[–] [email protected] 3 points 5 months ago

If I ever become a super 1337 hacker I'm going to setup all of my exploits to look like it could be regular mismanagement, thanks for the advice

load more comments (1 replies)
[–] [email protected] 13 points 5 months ago
[–] [email protected] 5 points 5 months ago

Looking forward to the Kevin Fang video in a few years.

load more comments
view more: next ›