[Info-vax] A meditation on the Antithesis of the VMS Ethos

Arne Vajhøj arne at vajhoej.dk
Sun Jul 21 09:50:36 EDT 2024


On 7/21/2024 8:55 AM, Craig A. Berry wrote:
> On 7/21/24 4:41 AM, Subcommandante XDelta wrote:
>> The problem here is that Crowdstrike pushed out an evidently broken
>> kernel driver that locked whatever system that installed it in a
>> permanent boot loop. The system would start loading Windows, encounter
>> a fatal error, and reboot. And reboot. Again and again. It, in
>> essence, rendered those machines useless.
> 
> It was not a kernel driver.  It was a bad configuration file that
> normally gets updated several times a day:
> 
> https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/

So not a driver.

But I will not blame anyone for assuming that a .SYS file under
C:\Windows\System32\drivers was a driver.

> The bad file was only in the wild for about an hour and a half.  Folks
> in the US who powered off Thursday evening and didn't get up too early
> Friday would've been fine.  Of course Europe was well into their work
> day, and lot of computers stay on overnight.

The impact was pretty huge.

> The boot loop may or may not be permanent -- lots of systems have
> eventually managed to get the corrected file by doing nothing other than
> repeated reboots.  No, that doesn't always work.
> 
> The update was "designed to target newly observed, malicious named pipes
> being used by common C2 frameworks in cyberattacks."
> 
> Most likely what makes CrowdStrike popular is that they are continuously
> updating countermeasures as threats are observed, but that flies in the
> face of normal deployment practices where you don't bet the farm on a
> single update that affects all systems all at once.  For example, in
> Microsoft Azure, you can set up redundancy for your PaaS and SaaS
> offerings so that if an update breaks all the servers in one data
> center, your services are still up and running in another.  Most
> enterprises will have similar planning for private data centers.
> 
> CrowdStrike thought updating the entire world in an instant was a good
> idea. While no one wants to sit there vulnerable to a known threat for
> any length of time, I suspect that idea will get revisited. If they had
> simply staggered the update over a few hours, the catastrophe would have
> been much smaller.  Customers will likely be asking for more control
> over when they get updates, and, for example, wanting to set up
> different update channels for servers and PCs.

I have already seen speculation that IT security will decrease because
patch deployment speed will slow down.

Arne

PS: I don't like the product!




More information about the Info-vax mailing list