the crowdstrike situation is wild

Поделиться
HTML-код
  • Опубликовано: 18 сен 2024
  • The title says it all lol watch this video find out more about how they messed up so bad.
    🏫 COURSES 🏫 Learn to code in C at lowlevel.academy
    🛒 GREAT BOOKS FOR THE LOWEST LEVEL🛒
    Blue Fox: Arm Assembly Internals and Reverse Engineering: amzn.to/4394t87
    Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation : amzn.to/3C1z4sk
    Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software : amzn.to/3C1daFy
    The Ghidra Book: The Definitive Guide: amzn.to/3WC2Vkg
    🔥 SOCIALS 🔥
    Come hang out at lowlevel.tv

Комментарии • 1,7 тыс.

  • @LowLevelLearning
    @LowLevelLearning  2 месяца назад +432

    wow haha that video was really cool, I heard these courses at lowlevel.academy are also really cool

    • @LowLevelLearning
      @LowLevelLearning  2 месяца назад +106

      haha yeah

    • @jamescollier3
      @jamescollier3 2 месяца назад +7

      Thank you! Best on the internet

    • @Mr.Pandey28
      @Mr.Pandey28 2 месяца назад +3

      @@LowLevelLearning please make a video on the details and what actually caused the issue !!

    • @ziggy7676
      @ziggy7676 2 месяца назад +4

      What if I'm already a low level god?

    • @Kane0123
      @Kane0123 2 месяца назад

      Do you know if customers have the ability to not receive instant updates? Or is it something crowdstrike requires at contract time

  • @XueYlva
    @XueYlva 2 месяца назад +1844

    Crowd-Strike: Global Offensive

  • @Patterner
    @Patterner 2 месяца назад +1074

    a newsletter email had the following greeting:
    "Good morning and happy Friday to everyone who doesn’t work in IT."

    • @DioTheGreatOne
      @DioTheGreatOne 2 месяца назад

      Look on the bright side, demand for IT guys has skyrocketed, and what does a sudden high demand spike mean? That's right, IT guys can charge whatever they want now because every company is completely desperate for them.

    • @SolidIncMedia
      @SolidIncMedia 2 месяца назад +85

      To be fair, that's how people treat IT workers, even when things are working perfectly.

    • @cix9420
      @cix9420 2 месяца назад +18

      @@SolidIncMedia sir you're on call and im working late, bring me some mcdonalds would ya?

    • @David-gu8hv
      @David-gu8hv 2 месяца назад

      @@SolidIncMedia Lol

    • @tbg07
      @tbg07 Месяц назад

      @@Patterner Which newsletter? Wanna see this.

  • @metcaelfe
    @metcaelfe 2 месяца назад +3058

    They certainly made a lot of machines unhackable

    • @Парасолька-х1и
      @Парасолька-х1и 2 месяца назад +81

      now noone can steal their data

    • @wervicecoding
      @wervicecoding 2 месяца назад +32

      Not until somebody plugs in Serial

    • @gerdd6692
      @gerdd6692 2 месяца назад +31

      That leaves us with the philosophical question: Is a hacked machine unhackable? Or can a dead animal be killed? (Disregarding for the purposes of this discussion that the "hack" was presumably unintentional - it was effective, nonetheless ...

    • @MathewBoorman
      @MathewBoorman 2 месяца назад +10

      A lot like speed limits, No IT is Safe IT.

    • @corteztt518
      @corteztt518 2 месяца назад +6

      @@gerdd6692 you got me at ‘can a dead animal be killed’

  • @georgeprout42
    @georgeprout42 2 месяца назад +1033

    Crowdstrike, according to their name, worked perfectly.

    • @justinlinotte2981
      @justinlinotte2981 2 месяца назад +28

      why they choose a name like this?

    • @Emperor.Arasaka
      @Emperor.Arasaka 2 месяца назад

      @@justinlinotte2981 all part of the CIA backdoor testing

    • @context_eidolon_music
      @context_eidolon_music 2 месяца назад

      @@justinlinotte2981 To take down the Internet for real soon, dummy.

    • @KangJangkrik
      @KangJangkrik 2 месяца назад

      ​@@justinlinotte2981 for fun? Why not
      ¯\_(ツ)_/¯

    • @murtajiz545
      @murtajiz545 2 месяца назад +40

      @@justinlinotte2981 No idea but it’s painfully poetic

  • @mastaphaaz3424
    @mastaphaaz3424 2 месяца назад +3722

    So the learned lesson is never push code in production on friday

    • @Fraket
      @Fraket 2 месяца назад +310

      that's been an industry-wide standard for decades

    • @ovalwingnut
      @ovalwingnut 2 месяца назад +67

      Yes.. you need to be "young & bold" to do some things. Like climbing HUGE radio towers. As you get older, you have a tendency not to want to rock the boat. Which has it's own drawbacks So yeah, I've morphed into a chicken 🐔

    • @neruneri
      @neruneri 2 месяца назад +81

      The real lesson tbh is for managers and executives to stop allowing the overworked IT guy to push code to prod on a friday.

    • @Mordecrox
      @Mordecrox 2 месяца назад +41

      Some gurus actually go to great length to "demistify this myth" and now they must be in shambles that we have ultimate proof to never do that

    • @FullDupl3x
      @FullDupl3x 2 месяца назад +29

      read only Friday!

  • @JonitoFischer
    @JonitoFischer 2 месяца назад +274

    ”The only safe computer is the one that does not boot" Crowdstrike CEO.

    • @Shocker99
      @Shocker99 2 месяца назад +8

      Technically true

    • @mar25947
      @mar25947 Месяц назад +3

      😂😂😂

    • @babybirdhome
      @babybirdhome Месяц назад +5

      To be fair, this violates one of the three tenets of cybersecurity, and it's one that people outside (and sometimes even inside) of the field forget the most. Confidentiality, Integrity, and *_AVAILABILITY._* If you're missing any of these three, you haven't got security.

  • @theAmazingJunkman
    @theAmazingJunkman 2 месяца назад +410

    The fact that a segfault just caused Y2K to happen 24.5 years late is wildly amusing to me

    • @fnytnqsladcgqlefzcqxlzlcgj9220
      @fnytnqsladcgqlefzcqxlzlcgj9220 2 месяца назад +9

      HAHAAHAHA didn't think about it like that lol

    • @ilonachan
      @ilonachan 2 месяца назад +12

      oh damn ur right, this IS what they were afraid of!

    • @NickRoman
      @NickRoman 2 месяца назад +29

      Except, we had to update BIOSs to prepare for Y2K. This was: reboot, delete a file, reboot. I'm thankful that the fix was so easy (albeit time consuming).

    • @JustSomeDinosaurPerson
      @JustSomeDinosaurPerson 2 месяца назад +35

      @@NickRoman Unfortunately this did not work for every affected system. Throughout the organization I work for we had to use restore points because either the files wouldn't delete themselves or deleting said file wouldn't resolve the issue. What an absolute fucking nightmare.
      Edit: To clarify, we still got all of it fixed. It just took a hell of a lot longer than wanted and many of us stayed overnight. Corporate straight up expensed all of our food orders, no questions asked.

    • @MrJamesVanEngen
      @MrJamesVanEngen Месяц назад

      We prepare for a primary election while identity theft is rampant. Magnificent! 🤦 ... The oligarchy of American credit scoring companies might as well be assigning random credit scores to each citizen within legal ramifications again. #VoteMillennial in 2024!
      🪙💵💳🤖🇺🇸

  • @aisle_of_view
    @aisle_of_view 2 месяца назад +295

    All the times I've had to explain to management why we should wait a few days before implementing an update, only to be met with blank stares. I'm loving every second of this.

    • @InvisibleHotdog
      @InvisibleHotdog 2 месяца назад +9

      @@aisle_of_view they probably conveniently forgot

    • @devrim-oguz
      @devrim-oguz 2 месяца назад +15

      The only thing is this happened via unattended upgrades

    • @CoderDBF
      @CoderDBF 2 месяца назад +9

      I agree and disagree.
      For example a server should probably try to be up to date with security. It can happen that a security issue has been released then there will be an entire army of bots sniffing every server that hasn’t been patched yet in an attempt to hack them. So you want to be fast in plugging holes because those bots will be very fast in finding your unpatched servers.
      Any other update like windows workstations can probably wait a few days without issues.

    • @benjaminblack91
      @benjaminblack91 2 месяца назад +5

      @@CoderDBF This particular case would be considered a security update, as it is an update to endpoint security software.

    • @MrCyanist
      @MrCyanist 2 месяца назад +5

      @@CoderDBF Hard disagree even patches targeting critical security flaws have enough time to at least test in non critical pilot servers or clients. If a security issues found its already known for a while by bad actors while issue becoming well known will increase attackers testing for few hours will hardly change anything compared to auto pushing to every server/client.

  • @MenaceInc
    @MenaceInc 2 месяца назад +1038

    Today was not the best day for me to wear my Crowdstrike t-shirt...

    • @brutely9718
      @brutely9718 2 месяца назад

      @@MenaceInc No don't think.. crowdstrik is saving world from hackers. Mistakes happens

    • @akpokemon
      @akpokemon 2 месяца назад +65

      Or if you enjoy small talk, it's the best day--great conversation starter

    • @araz911
      @araz911 2 месяца назад +2

      this is most likely due to open source software

    • @shauas4224
      @shauas4224 2 месяца назад +52

      ​@@araz911 what

    • @araz911
      @araz911 2 месяца назад

      @@shauas4224 the shutdown due to open source libs most likely

  • @justinlinotte2981
    @justinlinotte2981 2 месяца назад +336

    its cool to see pure technical explanation of how it happens, its far from common medias that only use shocking words to get as much audience as possible while they don't know a thing about what happened

    • @TheStoneMountain1
      @TheStoneMountain1 2 месяца назад +16

      I totally agree! I for one barely read the "regular" news because of how it almost always feels like they have one sentence of information to deliver and extrapolate it to a whole article with a bunch of word poop and no real info.
      So I prefer this type of delivery every time! Informative, deep dive into the interesting bit, short and quick to the point!

    • @martin.1976
      @martin.1976 2 месяца назад +5

      @@justinlinotte2981 Definitely! I was quite confused about how this could have happened in the first place - and none of those other channel had covered that - but seeing that the actually delivered driver was all nulls explained it perfectly well. And this is likely why this passed all testing and everything.

    • @robertjenkins6132
      @robertjenkins6132 2 месяца назад +1

      @@TheStoneMountain1 Yes, and it's not just tech. Today I was reading in the New York Times about how there were violent protests in Bangladesh over a "quota system" for government jobs, but they declined to explain what this "quota system" was. I was curious to know what would provoke such protests. I found better information on Wikipedia, in articles such as "Quota system of Bangladesh Civil Service" and "2018 Bangladesh quota reform movement". MSM reporting is so vague and dumbed-down. (They also do "fact checks" on statements, e.g., by Trump or a random conspiracy theorist on social media, that anyone with a brain would know are _obviously_ false.) It insults my intelligence.

    • @TRFAD
      @TRFAD 2 месяца назад +1

      @@TheStoneMountain1 Yeah for 4 pages, and "you'll never guess the shocking reason" but never even mentions it once while you fight through ads and trying to click the next button.

    • @phoenixflower1225
      @phoenixflower1225 2 месяца назад +2

      100% I love this explanation - typical media always exaggerates everything

  • @yassinesafraoui
    @yassinesafraoui 2 месяца назад +724

    They literally waited for most RUclipsrs to go on vacation before rolling out the update lol

    • @prezadent1
      @prezadent1 2 месяца назад +7

      'Literally' as opposed to what? Figuratively?

    • @katnoto8993
      @katnoto8993 2 месяца назад +59

      @@prezadent1 using "literally" in this way is a form of hyperbole. English is cool like that 😎

    • @Maxawa0851
      @Maxawa0851 2 месяца назад +31

      @prezadent1 if you google the definition of 'literally' the second definition of literally is literally 'not literally'

    • @Reydriel
      @Reydriel 2 месяца назад +6

      ​@@Maxawa0851Yep, a ton of English words have contradictory meanings like this unfortunately lmao

    • @NickRoman
      @NickRoman 2 месяца назад +2

      They probably push out updates every few days.

  • @lols11
    @lols11 2 месяца назад +103

    "//Just a small fix, no need to test it"

  • @user-fw1ok4lz2j
    @user-fw1ok4lz2j 2 месяца назад +254

    this was so bad that bro had to make a YT video while been on vacation. what a legend

  • @joshuac5229
    @joshuac5229 2 месяца назад +362

    This is just viral marketing for Captain Crunch's new cereal, "OOPS! ALL NULL!"

    • @lashlarue7924
      @lashlarue7924 2 месяца назад +8

      😂😂😂 thank you, please take my like, I cannot even 😂😂😂💀⚰️🪦

  • @_JohnHammond
    @_JohnHammond 2 месяца назад +570

    HAPPY VACATION ED
    WHAT A DAY (/WEEKEND/WEEK/MONTH) 💥

    • @brandonw1604
      @brandonw1604 2 месяца назад +13

      Can we rename it to Blue Falcon?

    • @Kane0123
      @Kane0123 2 месяца назад +5

      Bro was definitely having beers by the pool before this. Spring break feels for sure

    • @darkshoxx
      @darkshoxx 2 месяца назад +2

      @_JohnHammond you don't get any rest at the moment do you 😆

    • @faust9091
      @faust9091 2 месяца назад

      Why are you not the top comment wtf? Love you both ❤

    • @lumikarhu
      @lumikarhu Месяц назад

      you're also gonna farm videos out of that as usually, aren't you
      don't forget to mention that while CS released a faulty package tons of morons allowed it to update itself (or even worse - pushed updates themselves) on a fucking Friday. they deserve that, it's basic sysadmin knowledge

  • @lucaslannes4004
    @lucaslannes4004 2 месяца назад +216

    I work on an airline, you dont imagine the mess. Oh Jesus, today was a nightmare. Hope tomorow get better.

    • @MarianoLu
      @MarianoLu 2 месяца назад +12

      I feel for you buddy

    • @nicejungle
      @nicejungle 2 месяца назад +21

      it will happen again as long as airline companies use windows

    • @malavoy1
      @malavoy1 2 месяца назад +15

      @@nicejungle And if they'd used Linux, they would have went down in April with kernel panics. It's not the OS that's the problem, it's Crowdstrike.

    • @nicejungle
      @nicejungle 2 месяца назад +13

      @@malavoy1 And if they'd used Linux, one reboot and you switch back to the previous kernel
      Down time : one reboot
      Compare to windows : you're screwed

    • @malavoy1
      @malavoy1 2 месяца назад +2

      @@nicejungle But Linux users are tech savvy. Most users of Windows are not, so MS hides safe mode behind multiple reboots to prevent them from ruining their system (and they would blame MS if they did ruin their system). Once in safe mode you can roll back system changes.

  • @MSThalamus-gj9oi
    @MSThalamus-gj9oi 2 месяца назад +193

    This will absolutely *not* be the last time something like this happens. When I first started in the industry, everything was packaged on disk/disc. Fixing a bug after shipping was EXPENSIVE, so we got the product to a 99% stable place and then kept trying to squeeze that last 1% of bugs out. Now? People just throw garbage over the fence, figuring they can just ship a patch later. Kernel mode software just *cannot* be developed that way. But... cyber security companies have time pressure that other kernel mode developers don't necessarily face. To be useful, such an app must be updated and deployed amazingly quickly, especially for kernel space, but that agility comes at the cost of stability. When the cure is worse than the disease, though... there's a problem.

    • @kugelblitz1557
      @kugelblitz1557 2 месяца назад +28

      At the very least (assuming it's not an immediate security risk) then updates should be delayed a couple hours by region or something, so if this happens then it's a smaller section of customers that get screwed over and they have time to cancel it and get it fixed for the rest of the world.

    • @Bubblessss420
      @Bubblessss420 2 месяца назад +3

      @@MSThalamus-gj9oi exactly! thats why i bought some CS stocks after the fall down. CS is a great vendor but this kind of things unfortunatelly could happen.

    • @framegrace1
      @framegrace1 2 месяца назад +7

      @@kugelblitz1557 Just apply CI/CD techniques. The first rule is "Only package once, at the beginning of the release, same package tested is the same deployed".

    • @workmad3
      @workmad3 2 месяца назад +4

      While I agree that this sort of software can't be developed in the same way as a lot of stuff, there's also not really any evidence here that it was.
      The fact the update file was completely zeroed out points to a failure way past a dev shipping a bad code update... I can't see any way this happens without it being a build or deploy failure.

    • @MSThalamus-gj9oi
      @MSThalamus-gj9oi 2 месяца назад +2

      @@Bubblessss420 I was thinking of doing the same. The stock price dropped 20%, but you know it'll bounce back. It's a bargain right now. (No, I'm not a shilling bot. :D)

  • @victotronics
    @victotronics 2 месяца назад +300

    "The entire internet" for as far as it runs Windows. If it had taken down Linux the actual internet would have gone down.

    • @Sandromatic
      @Sandromatic 2 месяца назад +100

      Apparently in April, crowdstrike for debian actually went down in a similar manner, (kernel panics.) thankfully I guess no-one actually uses crowdstrike for Linux so no-one actually cared.

    • @lashlarue7924
      @lashlarue7924 2 месяца назад +5

      Facts.

    • @TimothyWhiteheadzm
      @TimothyWhiteheadzm 2 месяца назад +11

      Yeah, my internet was just fine, so not sure what he meant. Airports are not 'the internet'.

    • @NickRoman
      @NickRoman 2 месяца назад +3

      @@TimothyWhiteheadzm , well, I'm thankful that RUclips, Netflix, HBO... were all fine or fixed quickly.

    • @entcraft44
      @entcraft44 2 месяца назад

      Worldwide outages + clickbait = "The internet is going down". They claimed the same with the recent massive Facebook outage.

  • @cslearn3044
    @cslearn3044 2 месяца назад +403

    Crowdstrike, tests code only once, at production

    • @gerdd6692
      @gerdd6692 2 месяца назад +35

      Not only once - they do millions of parallel tests on a vast array of systems - without making the code platform independent they could only better this by cranking up a few zillion virtual machines or container "farms" ...

    • @Brahvim
      @Brahvim 2 месяца назад +15

      @@gerdd6692 Yeah, this one sounds like a problem with deployment instead, doesn't it?

    • @martin.1976
      @martin.1976 2 месяца назад +20

      I don't think we can dismiss the problem with such a "simple" explanation. Most certainly, they did test their code very properly and extensively.
      But they missed one of the most important factors: that things could possibly go very wrong in transmission.

    • @matt7253
      @matt7253 2 месяца назад +1

      @Brahvim that's what I was thinking/the build. Development can have different config for build/deploy and you may not see until you pushed to the environment. Even with a UAT sometimes the config can be slightly different than prod even though it should be as close if non near identical to prod.

    • @cslearn3044
      @cslearn3044 2 месяца назад +1

      @@gerdd6692 yeah im just joking

  • @internetuser8922
    @internetuser8922 2 месяца назад +44

    I watched a ton of videos on WTF even happened here. This was the only one that actually explained what went wrong in any kind of detail, and you're on vacation.
    Absolutely amazing channel here.

    • @MarkusHobelsberger
      @MarkusHobelsberger Месяц назад +1

      This. It's a super-simple error, yet no mainstream media explains it in a comprehendable way.

  • @kleoCodes
    @kleoCodes 2 месяца назад +571

    The crowd was striked by a blue screen of death

    • @samiraperi467
      @samiraperi467 2 месяца назад +29

      Struck.

    • @vizionthing
      @vizionthing 2 месяца назад +19

      @@samiraperi467 Stricken

    • @emusunlimited
      @emusunlimited 2 месяца назад

      @@samiraperi467 Moron, your bus is leaving… 🚌
      It’s CrowdStrike not CrowdStruck

    • @emusunlimited
      @emusunlimited 2 месяца назад

      @@samiraperi467 Never heard of CrowdStruck… is that some tech company or something?

    • @TabTray
      @TabTray 2 месяца назад +15

      @@vizionthing Stricketh

  • @69clouds
    @69clouds 2 месяца назад +207

    The fact that it was an Antivirus that performed the single most successful malware attacks ever is just pure poetry.
    Another win for the "remind me later" to every update gang.
    My dad: Come on, it's just an internship, what's the worst that could happen?
    Me: "You can't hack a system if the system doesn't work! "
    - Cybersecurity
    The alpha move of doing something that would make your stock value crash, but simultaneously freezing the stock market so that it can't.

    • @Dead_Goat
      @Dead_Goat 2 месяца назад +20

      Windows update doesnt matter. THis is not a win for remind me later as you cannot reind me later with this terrible crowdstrike rootkit.

    • @69clouds
      @69clouds 2 месяца назад +6

      I am aware of that, it just sounded like a good joke so I added it up.

    • @cix9420
      @cix9420 2 месяца назад

      if you would like to make a bet, many futures brokers are still working, so when the market opens you can go short or long with some margin if you think this will have an effect on the worldwide markets (it will)

    • @ajinkyamogre8515
      @ajinkyamogre8515 2 месяца назад +8

      So you just compiled the top comments across youtube over this topic and copy pasted them here for likes. Cool.

    • @cix9420
      @cix9420 2 месяца назад +1

      @@ajinkyamogre8515 with how internet speech is i didnt even realize it, i just assumed all of this stuff was one full sarcastic comment

  • @deeiks12
    @deeiks12 2 месяца назад +130

    I'm sure lots of people are looking for vulnerabilities in crowdstrike now. I don't know how public this was before that SO many companies are using their product....

    • @cbaesemanai
      @cbaesemanai 2 месяца назад +30

      they just showed us the vulnerability, creating a sys file full of nulls.

    • @MarianoLu
      @MarianoLu 2 месяца назад +3

      @@deeiks12 it is very public that literally everyone (in corporate IT) uses their products, the thing is that is transparent for most non IT people and they do not have a consumer version. And unfortunately they are ( or were) the best in the business.

    • @renato360a
      @renato360a 2 месяца назад +1

      @@cbaesemanai you had to actually be them to do that in the first place, so.. that's not it. Unless maybe if you hack the provider of their update pipeline, which might actually be what happened. But I guess if you did that you could break so much more.

    • @cbaesemanai
      @cbaesemanai 2 месяца назад

      @@renato360a I mean using it as a local exploit.

    • @Shocker99
      @Shocker99 2 месяца назад +1

      Crowdstrike is well known. They've had hordes of people looking for vulnerabilities in their software for years.

  • @BogdanTimofte
    @BogdanTimofte 2 месяца назад +18

    25 years ago, operating systems started signing drivers. 15 years ago, the same thing happened with the bootloader. A few years ago I heard that all PCs had to be replaced so that Windows could guarantee security. Now I understand that it gives total control over the computer during the initialization phase to a program without the slightest verification, just because it is in the right place in the filesystem and the name seems familiar? Live and learn...

  • @MattGreer
    @MattGreer 2 месяца назад +45

    But why did they roll out this update to every computer in the world all at once? Why didn't they run a canary? Why didn't they do the rollout in phases?
    It's low level code running in the kernel, and it is deployed in machines all around the world by thousands of businesses, why on earth wouldn't they be more cautious with the rollout? This is quite possibly the most reckless deployment in the entire history of software.

    • @Pipe0481
      @Pipe0481 2 месяца назад +8

      Because AFAIK they didn't update the software itself, but rather they just pushed a new virus signature database file. The real issue is that the Falcon program can't handle invalid files

    • @MattGreer
      @MattGreer 2 месяца назад +11

      @@Pipe0481 That's still doable with a slow roll out, canary, dog fooding, etc. Anything at this scale should be done with extreme care. Heck, even if not at this scale, there's no reason to be so reckless.

    • @michaelharrison1093
      @michaelharrison1093 2 месяца назад

      @@MattGreer simple answer - they are morons

    • @auzziegamer4661
      @auzziegamer4661 Месяц назад

      @@Pipe0481 more technically windows can't handle invalid files or any program for that matter

    • @ShadoFXPerino
      @ShadoFXPerino Месяц назад

      @@MattGreer If you canary then all the non-canaries are vulnerable to zero day from the new virus.

  • @seeibe
    @seeibe 2 месяца назад +69

    My vscode tunnel into my dev machine randomly stopped working yesterday and made me realize how much it sucks to be dependent on someone else for your own setup.

    • @najtofnin2009
      @najtofnin2009 2 месяца назад +3

      Dude. You're using vscode. Welcome to Microsoft dependence inc.

    • @not_kode_kun
      @not_kode_kun Месяц назад +4

      linux, emacs, vim, helix are waiting for you with wide arms

  • @Somezable
    @Somezable Месяц назад +4

    I bet one of the reasons for this is the LEAN. A plaque of corporate goal of efficiency that ends up ruining workplaces, if allowed to continue too long. I can guarantee we will later hear, if the company isn't able to hide it, workers at crowdstrike were overworked, overstressed, always pushed into a rush and denied time to make critical quality assurance checks and tests, that would have caught this error.

    • @rikuleinonen
      @rikuleinonen Месяц назад +2

      I feel like all the blame is going to be pushed onto the employee that coded in the mistake while the CEO/manager that made them do so via overworking them etc. will get away scott-free.

  • @j340_official
    @j340_official Месяц назад +6

    So community notes on Twitter is saying the viral tweet that claimed it was a null pointer dereference is BS.
    And crowdstrike put out a blog statement that “This is not related to null bytes contained within Channel File 291 or any other Channel File.”

  • @c_ornato
    @c_ornato 2 месяца назад +140

    It baffles me that people would modify any piece of code that sensible without testing on a friday, hell even I check 3 times that my KBPs are correct before restarting

    • @lion21297
      @lion21297 2 месяца назад +51

      I'm sure they did test it.. the issue must have happened when actually pushing the update live. Doesn't excuse a friday update though. That's just asking for trouble

    • @asynchronerflugelflitzerim8481
      @asynchronerflugelflitzerim8481 2 месяца назад

      @@c_ornato there was still a network connection, right?

    • @c_ornato
      @c_ornato 2 месяца назад

      @@lion21297 Doesn't excuse pushing to every user at the same time either, you'd think the devs for a highly-used expensive piece of software would be more rigorous but it seems the dev instinct to push stuff fast does not discriminate.

    • @ninele7
      @ninele7 2 месяца назад

      @@lion21297 You need to understand that it is a security software. Maybe they've implemented protection from new attack vector. And hackers don't rest on weekends.
      As we see, problem happened at some unpredictable late stage (file became all zeroes, it's not compiler output). Even if they released it on any other weekday effect would be the same.

    • @mallninja9805
      @mallninja9805 2 месяца назад

      @@lion21297 Sounds like there's a gap in their deployment testing...

  • @thunderb00m
    @thunderb00m 2 месяца назад +53

    How the hell is a multi billion dollar company not have basic error handling like null check!? Like seriously do they not take functional safety seriously!?

    • @Shocker99
      @Shocker99 2 месяца назад +19

      How do they not a pre-update push set up that acts as if the machines are actual client computers to test all updates before being pushed to real clients?

    • @TheFunkyTechGuy
      @TheFunkyTechGuy 2 месяца назад +1

      @@Shocker99 My thinking exactly, this is basic stuff.

    • @linkernick5379
      @linkernick5379 2 месяца назад +2

      Almost nobody checks the result of many functions, e.g. malloc or printf. Defensive programming techniques are clunky, cumbersome but still dont save you from errors (ref: "The Art of Software Testing" book).
      The only way to get rid of whole classes of errors is with good type system, in other words to detect by compiler.

    • @AndrewBrownK
      @AndrewBrownK 2 месяца назад +8

      cue elitist C++ dev entering the scene and saying "no no this isn't a technology problem, this was a skill issue haha, I'd NEVER do this, I'm too skilled"

    • @williamforsyth6667
      @williamforsyth6667 2 месяца назад +4

      "error handling like null check!"
      It should have been caught much earlier. Seem they have no integrity check of their binaries during the build-test-distribution process.

  • @edwardallenthree
    @edwardallenthree 2 месяца назад +20

    Excellent video!
    My wife has high confidence in her coworkers following the instructions and fixing their desktops and laptops. I think the person who replied all to the instructions asking for his encryption key is proof that this is going to be one long weekend for people in IT. Never been happier to be retired.

    • @ScottForrest420
      @ScottForrest420 2 месяца назад +5

      Me too. Retired two months ago from a law firm who uses Crowd Strike through a consultant/VAR. I was imagining the entire firm losing their mind today due to this. Funny/not funny, but so happy it wasn't me having to deal with it.

    • @chrisalmighty
      @chrisalmighty 2 месяца назад

      @@edwardallenthree you're spot-on with that 😅

  • @JohnFink-p5l
    @JohnFink-p5l 2 месяца назад +66

    As an IT guy, I have been working non-stop all day today. It's utter insanity here at this company. Those dumb bastards

    • @haroldcruz8550
      @haroldcruz8550 2 месяца назад +19

      Hey at least now they realize how important you are.

    • @BoraHorzaGobuchul
      @BoraHorzaGobuchul 2 месяца назад +16

      Oh my god, they killed kernel! The bastards!

    • @pieterbezuidenhout3757
      @pieterbezuidenhout3757 2 месяца назад +5

      At least we got our Servers up and running in 2 hours this morning, overtime cash, I feel you, Brother.

    • @MarkusHobelsberger
      @MarkusHobelsberger Месяц назад

      @@haroldcruz8550 They are rather going to blame him for the problems he's trying to fix. Unfortunate truth of working in IT.

    • @not_kode_kun
      @not_kode_kun Месяц назад

      @@pieterbezuidenhout3757 yall have windows in your servers? what the fuck are yall smoking

  • @Veptis
    @Veptis 2 месяца назад +54

    How did this roll out this widely?
    Is there no canary? Is there no QA?
    How is business and airports the first wave of roll out...
    How do you put all trust in a single third party?

    • @samniechcial8493
      @samniechcial8493 2 месяца назад +22

      @@Veptis I’m wondering the exact same thing.
      From the perspective of a DevOps/Infra engineer - What kind of update deployment strategy is “just hit all billion machines at once”?
      No canary? No region by region?
      More questions to be asked here than just what went wrong in the actual code…
      If this is how they deploy code with a bug, imagine if they deployed code with a serious vulnerability?
      We need to hear about Q/A and deployment strategy at CrowdStrike!

    • @outtakontroll3334
      @outtakontroll3334 2 месяца назад +5

      good questions, and someone is damnwell going to have to answer them

    • @vappyreon1176
      @vappyreon1176 2 месяца назад

      ​@@samniechcial8493just stop using windows they're not worth the security issues.

    • @tigerchills2079
      @tigerchills2079 2 месяца назад +4

      "How is business and airports the first wave of roll out..."
      someone else in the comments answered that already: they are the only ones to roll out to. it's big business software. there is no consumer grade product

    • @ShadoFXPerino
      @ShadoFXPerino Месяц назад

      There's no canary because what is pushed are virus signatures. If you canary then all the non-canaries will be vulnerable to the zero-day virus. Getting instant updates is the entire point of the product.
      QA probably happened, but after the QA they deployed the tested file to some file server and the file got corrupted in transmit into all-zeros, which causes a crash loop.

  • @theeternalsw0rd
    @theeternalsw0rd 2 месяца назад +23

    By the way, this is the second BSOD software update push George Kurtz, CEO of CrowdStrike has presided over. First was April 21, 2010 as CTO of McAfee when an update inadvertently deleted svchost.exe from Windows XP machines. That would have been more massive but for the lack of always auto-update devices nowadays.

    • @ernstraedecker6174
      @ernstraedecker6174 Месяц назад

      "Who needs svchost.exe anyways? I'm an ordinary Windows user, I don't use all those nerdy tools. Just trust the authorities. Safe and effective!"
      - All my friends.

  • @yarpen26
    @yarpen26 2 месяца назад +53

    I just got done writing a comment under Fireship's Code Review saying how Ed is bound to release a video on this as well soon enough, I reload my YT start page and I can see it up there, from 11 minutes ago.

  • @emilmofardin2.0
    @emilmofardin2.0 2 месяца назад +20

    My dad is a senior developer and we watched this happen in real-time. We spent the day installing Linux instead.

    • @jorper2526
      @jorper2526 2 месяца назад +3

      That isn't the fix. CrowdStrike also has a linux agent. EDR's MUST work at the kernel level to do their job. It is just that in this case, they messed up the file for Windows, not for Linux or Mac..

    • @ItsCOMMANDer_
      @ItsCOMMANDer_ 2 месяца назад

      @@jorper2526 although it is easier to monitor such stuff from userlevel in linux, i heard

    • @rikuleinonen
      @rikuleinonen Месяц назад

      @@jorper2526 is the Linux agent even Kernel-level? I recall hearing somewhere that it doesn't go nearly as deep as the Windows version.

    • @jorper2526
      @jorper2526 Месяц назад

      @@rikuleinonen it depends. But by default, yes.
      They did crash numerous linux machines in April.

    • @rikuleinonen
      @rikuleinonen Месяц назад

      @@jorper2526 thanks for the info.

  • @glowingone1774
    @glowingone1774 2 месяца назад +93

    cloudstroke

  • @_hugoi
    @_hugoi 2 месяца назад +57

    That was just like the *Y2K* bug... but this time nobody was expecting it LOL

    • @savagej4y241
      @savagej4y241 Месяц назад +1

      And the Y2K bug probably would have been less disruptive back then compared to a Crowdstrike error nuking systems operations worldwide now, because 24 years ago, you didn't have mission critical systems that require "always online" connections. It was a transitionary phase and older fallbacks were at the ready. Now its more damaging because the more modern systems ARE the fallback.

  • @riigel
    @riigel 2 месяца назад +176

    "should have used rust.. " 😂😂

    • @mushroomcrepes4780
      @mushroomcrepes4780 2 месяца назад +51

      these rust ads are getting crazy

    • @tomv1741
      @tomv1741 2 месяца назад +3

      @@mushroomcrepes4780 damn best rust ad ever 🤣🤣

    • @hwstar9416
      @hwstar9416 Месяц назад

      wouldn't have helped in this case

  • @observant6953
    @observant6953 2 месяца назад +2

    Thank you so much for actual getting into technical details. All other articles just repeat "well, everything is down".

  • @crispybatman480
    @crispybatman480 2 месяца назад +20

    Big hugs to all the people having to manually recover systems today.

    • @rcstl8815
      @rcstl8815 2 месяца назад +1

      I wonder what the Linux download sites are seeing?

    • @NewKiwiJK
      @NewKiwiJK 2 месяца назад

      yay overtime

    • @jnawk83
      @jnawk83 Месяц назад

      ​@@rcstl8815probably not much, corporations and enterprises don't tend to knee jerk quite that fast, if at all.

  • @BoraHorzaGobuchul
    @BoraHorzaGobuchul 2 месяца назад +8

    "looks like I picked the wrong week to stop sniffing glue"

  • @misogear
    @misogear 2 месяца назад +22

    The most important piece of software don't have rollback mechanism when update is broken is mind blown to me. 😂😂

    • @Xehlwan
      @Xehlwan 2 месяца назад +2

      @@misogear Oh, there is - Crowdstrike's update was just designed in a way that doesn't make use of that Windows feature.

    • @not_kode_kun
      @not_kode_kun Месяц назад

      @@Xehlwan except window's rollback is completely useless because you need to boot into the system, then jump through menus to finally rollback. the whole purpose of rollback is for when an update is BROKEN. if an update is broken and you can't rollback, then you dont have rollback. On linux, you can still rollback your kernel after a kernel panic (BSOD) with a single reboot

  • @MK73DS
    @MK73DS 2 месяца назад +69

    Just use a closed source piece of software on our closed source OS for our critical application, everything will be fine.

    • @MathewBoorman
      @MathewBoorman 2 месяца назад +16

      Boss, The closed source OS and hardware you have on your desk is not good enough to act as a dumb TV or kiosk by itself. First install the closed source drivers from a bunch of random hardware vendors. Then add some tooling to actually install and configure the host to do its thing. Add some more software to manage the truck loads of host security settings from all the stuff we don't need anyway, but can't remove. Add closed source kiosk software or maybe the POS application, which is just a wrapped browser. Buy some more security software since we can't trust any of the perviuos bits to work.
      Don't think about deploying a cheaper Open Source & Open Hardware solution, like a rasberry Pi.

    • @football42241
      @football42241 2 месяца назад +15

      Open/closed isnt the issue in this case. Corrupt auto software updates is, and they can (and do) happen to both.

    • @CharGorilla
      @CharGorilla Месяц назад

      @@football42241 Except you'd be ripped to shreds in an open source project if you committed code that runs kernel mode, downloads dynamic code off the internet and runs it in kernel mode, doesn't have any sort of integrity check on what it downloads off the internet, like a digital sgnature, or even a CRC32, AND the virtual machine / interpreter which runs the code that was downloaded off the internet isn't sand-boxed and lets the dynamic code use naked pointers. How many freaking basic mistakes did this "cybersecurity" company make here.
      Not to mention that all this time, their "cybersecurity" software has been one giant RCE waiting to happen if you manage to spoof the DNS of the update server, or MITM that HTTP(maybe S) request that we all know doesn't check for a specific root authority). I wonder how long the NSA have known about this one. I'd hope not as long as they kept Eternal Blue under wraps.

    • @not_kode_kun
      @not_kode_kun Месяц назад

      @@football42241 nope, auto software updates are extremely rare on open source operating systems. since they're made by devs, for devs, and all of us devs hate that shit. This crowdstrike thing could've very well happened even if the whole world ran on linux. but at least, it'd only happen to people who ran the update command, and even then all they'd need to do to get their computer back is rollback to previous kernel and reboot. The same problem could've happened, but it would've been in a smaller scale and easier to fix.

  • @andybreuhan
    @andybreuhan 2 месяца назад +12

    How was this .sys file signed? If it is all 0. how was Windows able to load this? Why are there no checks in place?

    • @Hexanitrobenzene
      @Hexanitrobenzene Месяц назад +2

      It seems that it is a submodule which is loaded by a CrowdStrike agent itself. That means they don't do basic checks...

  • @codycallaway9057
    @codycallaway9057 2 месяца назад +16

    I can feel a disturbance, as if millions of crowdstrike memes are being made

  • @garanceadrosehn9691
    @garanceadrosehn9691 2 месяца назад +67

    Also note this story: *"Major Microsoft 365 outage caused by Azure configuration change"*
    ... _"Microsoft says an Azure configuration change caused a major Microsoft 365 outage on Thursday, affecting customers across the Central US region. This massive outage started around 6:00 PM EST and prevented users from accessing various Microsoft 365 apps and services."_
    This happened hours *before* the Crowdstrike issue surfaced, and I also wonder if there might have been some connection.

    • @jacominnaar
      @jacominnaar 2 месяца назад +2

      We had issues on Azure with HTTP2 traffic in South Africa. I'm wondering if they are related.

    • @hellowill
      @hellowill 2 месяца назад +2

      yeah I noticed the Azure outage too. Funny how nobody cares or even blames MS for the Crowdstrike/Windows interaction.

    • @gabriel55ita
      @gabriel55ita 2 месяца назад +8

      ​@@hellowill why blaming ms for something another company did wrong, it's their responsibility to not ship something bad. Windows offers you to boot in safe mode to remove the driver that start prioritized

    • @workmad3
      @workmad3 2 месяца назад +14

      The Azure issue caused some of their compute to not be able to access storage. Then hours later, crowdstrike pushes an update that's completely zeroed out.
      If there isn't some connection and cascading failure discovered in postmortem it's going to be one hell of a coincidence 😅
      Still a pretty massive failure on crowdstrike's part to manage to drop the file onto so many machines without some verification raising an alert that this file is screwed

    • @gzoechi
      @gzoechi 2 месяца назад +3

      ​@@workmad3Also updates are usually pushed to a small selection of devices and when nothing bad happens, the number is increased

  • @donleyp
    @donleyp 2 месяца назад +8

    I was supposed to fly to Japan this morning. Crowdstrike canceled my flight. I’m glad you’re already at your destination, Ed. Have fun!

  • @kylekatzin1563
    @kylekatzin1563 2 месяца назад +31

    So funny, my first thought was who tf pushes out an update on a Friday..

    • @MarkusHobelsberger
      @MarkusHobelsberger Месяц назад

      Everyone does (working in software development in a small company here). If something goes wrong you will have time to fix it over the weekend. Something so critical should have been tested better, though.

  • @test40323
    @test40323 2 месяца назад +30

    i find it incredible crowdstrike didn't do a staged rollout considering the risks. this is an acute reminder that lab testing can't cover all scenarios and that a fallback plan is always necessary no matter how remote the probability of mishaps. defn: risks = probability(event) × cost of damage (event)

    • @Sandromatic
      @Sandromatic 2 месяца назад +6

      They actually did apparently. It's just, they didn't notice it until it'd rolled out to the majority of their userbase. Meaning they did a staged rollout but it was too fast/no-one was monitoring it to catch.
      I mean, that probably happens when you're doing it on a Friday.

    • @BoraHorzaGobuchul
      @BoraHorzaGobuchul 2 месяца назад

      Or testing

    • @jbird4478
      @jbird4478 2 месяца назад +1

      @@Sandromatic They apparently didn't notice at all. It was Google who pointed the finger, and even then it took them two hours to say "ehm.. yeah, it was us."

  • @glitchy_weasel
    @glitchy_weasel 2 месяца назад +18

    Nobody can't hack into your network if your entire network is down - I say this is mission accomplished 😎

    • @j_stach
      @j_stach 2 месяца назад +6

      Today was the most secure Windows has ever been

    • @tongpoo8985
      @tongpoo8985 2 месяца назад +3

      This is what I call a "paradigm shift" in cyber-security.

  • @DJJOOLZDE
    @DJJOOLZDE 2 месяца назад +23

    Kinda neat that so much of the internet depends on a few people uploading critical files.

    • @annmaryjohn3258
      @annmaryjohn3258 2 месяца назад +2

      @@DJJOOLZDE The internet is fine, it's the computers using Microsoft that has crashed.

  • @tejonBiker
    @tejonBiker 2 месяца назад +12

    Crowdstrike switched to MaS: Malware as Service.
    Pretty wild that a kernel-level software from a cybersecurity company deploy bad software

    • @Dead_Goat
      @Dead_Goat 2 месяца назад +8

      not really that wild. This is exactly why i have been fighting against using this crap. It does not increase security in anyway.

    • @rythem2257
      @rythem2257 2 месяца назад +1

      @@Dead_Goat If it didnt increase security, people wouldnt use. Who are you fooling lol?

    • @PvtAnonymous
      @PvtAnonymous 2 месяца назад +4

      @@rythem2257do you understand the concept of snake oil? That's exactly it.

    • @jorper2526
      @jorper2526 2 месяца назад

      @@PvtAnonymous Explain then. I'm sure you have TONS of great information on this subject, and not just some "hurr durr linux" type of reply.

    • @PvtAnonymous
      @PvtAnonymous 2 месяца назад

      @@jorper2526 what is there to explain? Just with any AV you introduce a single point of failure with extensive privileges into your OS or even your kernel. As seen in the last few days, there seems to be a lack of testing on Crowdstrikes end which resulted in - again - a single point of failure. Threat actors could just as well find a gullible employee or even infiltrate the whole company and introduce malicious code that could take over all of the machines and do whatever they want with them, basically making Falcon into a rootkit. This false sense of security is, you guessed it, snake oil.

  • @ecchioni
    @ecchioni 2 месяца назад +49

    Where the fuck was the test team? Oh wait... The modus operandi of a modern hackshop is fuck QA.

    • @joseoncrack
      @joseoncrack 2 месяца назад +4

      Yep. But remote updates are evil anyway. That's a nonsense from a sysadmin POV.

    • @ecchioni
      @ecchioni 2 месяца назад +4

      @@joseoncrack They are not paying for QA, do you think they'll pay for a stage environment and a team to manage it where the update is tested before it rolls to the rest of the org?

    • @DoinThatRag
      @DoinThatRag 2 месяца назад

      This is so sadly true. My CEO who likes to pretend he's a dev but isn't and has no background operates like this. I swear it is due to the development of CI/CD pipelines and how relatively "easy" it easy to write some APIs, just have the devs write tests for them, and throw out the latest update to your microservice. I mean all software functions like that doesn't it? The cloud systems you run for your little API services or pushing critical and sensitive updates to customer systems, what's the difference? So what if it is a kernel driver, just keep those updates rolling!

    • @haroldcruz8550
      @haroldcruz8550 2 месяца назад +1

      QA is not very cost effective. Why test when you can do it live

    • @ecchioni
      @ecchioni 2 месяца назад +1

      @@haroldcruz8550 Maybe to prevent a 20% stock drop and a big fuck you from the customers?

  • @alexholker1309
    @alexholker1309 2 месяца назад +3

    Thanks for the video. The file being corrupted does seem to explain how it could get past testing, if the failure to write only happened after they verified the file was safe.

  • @_GhostMiner
    @_GhostMiner 2 месяца назад +3

    *Hackers: try, and fail to take various systems down*
    *Crowdstroke: Fine. I'll do it myself.*

  • @TheBaldOne
    @TheBaldOne 2 месяца назад +13

    As an F1 fan I always wonder what crowdstrike was. Now I know lol

  • @benbohannon
    @benbohannon 2 месяца назад +4

    So, for the few companies Microsoft trusts to operate at the sys/kernel level, all updates should be funneled through Microsoft test channels. They cannot have companies breaking their install base.

    • @TonyJewell0
      @TonyJewell0 2 месяца назад +2

      THIS. I was ranting to my wife yesterday evening about this. Bless her, she knows nothing about IT and made all the right noises.

  • @pixelshocker7775
    @pixelshocker7775 2 месяца назад +4

    Appreciate getting news from a source that actually knows what they're talking about. Props to LLL for taking the time to make a video while on vacation, and hopefully nothing equally newsworthy happens so he can just relax...

  • @Iceman259
    @Iceman259 2 месяца назад +9

    I, for one, am shocked that the company called "CrowdStrike" which thinks it's a great idea to advertise on race cars would ever do something so ill-advised.

    • @manoflead643
      @manoflead643 2 месяца назад

      That's memorable! Good advertising, honestly.

  • @xmlthegreat
    @xmlthegreat 2 месяца назад +38

    I remember seeing an article about how CrowdStrike's CEO regretted not firing people earlier... In 2020.
    I guess he's reaping now eh?

    • @Brahvim
      @Brahvim 2 месяца назад

      So... the CEO might regret _regretting_ the thought of _firing people_ who may now provide support to customers?
      ...Or is it that he would've found that firing these guys early - the ones who couldn't deploy this crashing update correctly, as beneficial?

    • @renato360a
      @renato360a 2 месяца назад +1

      yeah, I don't know how to read this. Should he have fired them earlier, or should he have kept them?

    • @mudi2000a
      @mudi2000a 2 месяца назад

      I guess he fired them later. I mean at the end of the day even someone who was fired could have planted this in a way that it looks just like a technical f-up.

    • @xmlthegreat
      @xmlthegreat Месяц назад

      You people have misunderstood the context.. the CEO laid off a bunch of people around 2020 and boasted how he probably should have done this earlier. Like Microsoft laying off most of their Windows QA teams so that they could use customers as Beta testers; when you reduce your employees you reduce the amount of slack the remaining people have to pick up on problems and head them off early. So a piece of code ends up in prod without at least 1 person catching a fatal bug. And some poor schmuck or team of schmucks who had to meet some kind of performance metric deadline push code on Friday that should have been tested more than just a few times on CrowdStrike's internal systems.

  • @brssnkl
    @brssnkl Месяц назад +1

    Your look is giving IT person they had to bring back from middle of his holiday to fix this. It feels so authentic :D

  • @brownlearner2164
    @brownlearner2164 2 месяца назад +10

    An intern writing tests with ChatGPT!

  • @MaffeyZilog
    @MaffeyZilog Месяц назад +2

    That was the reason for kicking Kaspersky out!
    They wanted one for a while and they got it even though every other AV vendor has more privileged access to your computer than Kapserky did!

  • @henson2k
    @henson2k 2 месяца назад +24

    Security nuts make things worse

    • @granthuling3235
      @granthuling3235 2 месяца назад

      @@henson2k Nassim Taleb will have a good take on this.

  • @boy_deploy
    @boy_deploy 2 месяца назад +17

    "Crowd Strike" literally 😂

    • @johngrant5881
      @johngrant5881 Месяц назад

      @@boy_deploy alex jones predicted this

  • @m4rvinmartian
    @m4rvinmartian 2 месяца назад +4

    *Make the SKINNIEST reference at bootdriver position, make sure it works... NEVER change it. Load everything else after the system is stable.*

  • @jeremybuckets
    @jeremybuckets 2 месяца назад +1

    "we're kind of dependent on these companies, and when they get it wrong, the whole world collapses. kind of makes you think."
    such a cheerful delivery of that truly terrifying statement.

  • @Stratelier
    @Stratelier 2 месяца назад +5

    This incident feels like something out of a Tom Scott spec video (re: "that time Google forgot to check passwords") ... or the definition of an "onosecond".
    2:55 - Wow. Just wow. I've personally experienced a few cases of complete individual file loss leaving behind "all nulls" (presumably from a failed deferred write-to-disk). But those were just two or three personal userfiles -- I couldn't imagine this occurring with a critical driver or system file.

  • @Salted_Potato
    @Salted_Potato 2 месяца назад +2

    For CrowdStrike outage, I went to mainstream media for human-readable explanation, I go to Fireship for system level explanation and now blessed with low-level-learning for the autopsy :D

  • @juanmacias5922
    @juanmacias5922 2 месяца назад +18

    I guess CrowdStrike doesn't believe in testing, or using canary systems LOL

  • @manualdidact
    @manualdidact 2 месяца назад +2

    Fireship for the snarky summary, Theo for the details, LLL for the disassembly. I missed out on all of this today, but I feel caught up now.

  • @eljuano28
    @eljuano28 2 месяца назад +10

    Blistex Inc is proud to announce they've teamed up with Linux to solve the blue screen of death. The "Tucks Medicated Pads" you already know and trust have been rebranded "Tux Crowdstrike Relief Pads" for Microsoft Windows users to relieve that burning sensation.

  • @chrisaustin9949
    @chrisaustin9949 Месяц назад +2

    So here's a question, why does any company allow Microsoft or Crowdstrike to push programs onto their production system, ever? Back when I was in IT we would never let anyone do that. We would take the software ourselves and try it on a test system first before putting it into production.

  • @delayed_control
    @delayed_control 2 месяца назад +39

    tfw title starts with lowercase "lol"

  • @luketurner314
    @luketurner314 2 месяца назад +12

    Another lesson to learn from all this is, "don't put all your eggs in one basket." Meaning, diversify your tech stack, operating system, and EDR provider. "Easier said than done", but would you rather have multiple points of failure? "More expensive to maintain"; more than being shut down for a prolonged period of time?

    • @MilionMaru
      @MilionMaru 2 месяца назад +4

      Greed is incompatible with logic

    • @gnuMan
      @gnuMan 2 месяца назад

      😂😂😂

    • @VioletEmerald
      @VioletEmerald Месяц назад

      @luketurner314 A lot of people operate on the security blanket of "well, if this basket drops it would be SO MANY eggs breaking across the world that that company is NEVER GONNA LET THE EGGS BREAK and that really is probably the safest basket to be in. At least we're all in it together!"

  • @norbert.kiszka
    @norbert.kiszka 2 месяца назад +17

    In Linux module file with all nulls will not crash the kernel because Linux kernel makes multiple checks on a module file. Also modules are single files (sometimes module can request another module but it will be loaded in the same way) instead of multiple files. Couple months ago I tried to read that module loading code, but its poorly documented to be easily readable (if somebody was working with this code for long time it will be much easier).

    • @vilian9185
      @vilian9185 2 месяца назад +1

      and tobe fair running crowdstrike on linux isn't needed, now with windows...

    • @norbert.kiszka
      @norbert.kiszka 2 месяца назад +1

      @@vilian9185 only updates, but that can be done automatically in most cases (sometimes it will reboot some services or You have to reboot system manually when kernel or libc has security patches).

    • @Turalcar
      @Turalcar 2 месяца назад +7

      @@vilian9185 but possible. Crowdstrike pushed a buggy debian update few months ago to a similar result (but fewer affected users).

    • @Dead_Goat
      @Dead_Goat 2 месяца назад +1

      @@vilian9185 you do understand that linux is very hackable and much more likely to actually need something like crowdstrike than a windows system right?

    • @vilian9185
      @vilian9185 2 месяца назад +9

      @@Dead_Goat no?, lmao wtf you're talking about

  • @MikkoRantalainen
    @MikkoRantalainen 2 месяца назад +1

    It's 100% safe to say that CrowdStrike's is not doing mutation testing for their kernel mode driver and that's scary!

  • @mihainita5325
    @mihainita5325 2 месяца назад +19

    What puzzles me is why deleting the file solves the problem.
    There should be no difference between the missing file and zeroed-out-file.
    An all-zero driver file it's missing all the standard exe structures. Has no header, no import, export, relocation tables.
    And no digital signature.
    So Windows should refuse to load such a "driver". Which would technically be the same as missing file.
    Who null pointer for zeroed-out-file but not for missing file? Can't load is can't load, no?
    I really suspect something more is going on here...

    • @MathewBoorman
      @MathewBoorman 2 месяца назад +3

      I am wondering that, might have got signed as nulls. CICD failure

    • @mihainita5325
      @mihainita5325 2 месяца назад +8

      @@MathewBoorman yes, but the signature should also be part of the file. So at least that would not be zeroes.
      Same for the exe header. If it is all zeroes it would not load.
      Unless the description as zeroed-out-file is not 100% accurate and the header is present, the signature is present and correct, etc.
      Which then raises the question what kind of processes do they have to create such a file, signing it, and push it out with no testing.
      This is not something that "it works on my machine" :-)
      Some big red flags about their processes...

    • @YouPlague
      @YouPlague 2 месяца назад +14

      Because if the file is missing opening it fails with a proper error. Once it opens the contents is trusted to be executed on the cpu.

    • @tma2001
      @tma2001 2 месяца назад +2

      the clownstrike background driver that listens for updates should of done at least a hash/crc etc check of the updated file before initiating a reboot. That's what I don't understand.

    • @juliavixen176
      @juliavixen176 2 месяца назад +2

      I use ZFS to store all my data, because I do *not* trust hardware. I always generate and verify MD5 hashes of my files and I have found so many _silent_ data corruption faults when a hard drive will randomly flip a single bit, or return 512 null bytes... with no hardware errors being detected/reported. SMART self-check says everything's ok; Linux device driver says everything is ok; etc.
      I mention this, because I have been given NTFS drives by other people, and upon checking the files, there will unexpectedly be 4096 null bytes where I was expecting data. (And I had a second copy of the file for comparison.)
      There were "no errors" reported at the hardware, filesystem, or OS levels. A file was silently replaced with a bunch of nulls... and I immediately wondered if Crowdstrike's build system is using NTFS.

  • @martin.1976
    @martin.1976 2 месяца назад +2

    First of all, thank you so very much for covering this during your vacations! I didn't even know this company existed until this morning, and quickly realized I'd only possibly get an explanation as to what happened from somebody like you, who knows about this stuff.
    One important lesson we need to learn from this is to ensue to do transaction-based updates and to ensure integrity of each update with a cryptographic signature. They have likely performed intensive in-house testing of that update - but just didn’t account for the possibility of the update being corrupted / tampered with in transit.
    However, if also brings up the question of whether we can really exclude the possibility of this being a dedicated cyber-attack that quickly!
    Because, to my knowledge, we don't know yet how exactly it could happen that the version of that update that was installed on these billions of devices came up all zeroes. Surely, it shouldn't have happened - and likely wouldn't have if they used even the most basic CRC approach to verity integrity.
    In that regard, the blame is by that company alone!
    However, I wouldn't necessarily exclude the possibility that some bad actor knew about this vulnerability and exploited it.

  • @erickhar
    @erickhar 2 месяца назад +4

    I love your channel. so cool that you took a vacation from your vacation for this :)

  • @ShaloopShaloop
    @ShaloopShaloop 2 месяца назад +1

    I need more Tank Top Beach Boy Low Level Learning. Good vibes

  • @martin.1976
    @martin.1976 2 месяца назад +13

    Quite a few people already commented about the lack of testing. We don't need to speculate about what kind of in-house testing they may or may not have conducted, because we can just look at the facts that we have so far, from a neutral point-of-view:
    Somehow, the final product / update that was shipped to billions of computers world-wide apparently didn't use even the most basic check-sum algorithm - let alone cryptographic signature as one would certainly expect from something of this magnitude.
    It doesn't matter at all how careful or negligent their engineers were in regards to developing, testing, or anything - the problem happened _AFTER_ the final product left their house.
    *BUT* they were negligent - and thus responsible - by shipping a product of this impact and magnitude without *ANY* checks that would prevent even an accidental tampering in process.

    • @Xehlwan
      @Xehlwan 2 месяца назад

      You're absolutely right. Bizarre bugs and errors can occur at almost any point, so any sane software would check the integrity of an update before installing it. That goes double for kernel level software.

  • @XerrolAvengerII
    @XerrolAvengerII 2 месяца назад +1

    I've been looking forward to you making a video about this since I saw the first Australian news reports this morning! Thanks for taking time out of your trip to film this!

  • @氷語
    @氷語 2 месяца назад +6

    It's ridiculous that they can't even save a single boolean or something to disk and and clear it when the OS booted, this so next time your driver loads it can check for the boolean to be true and just not load (because you can safely assume the PC crashed), and while in the OS your non-driver part of the code could check for updates...

    • @az-kalaak6215
      @az-kalaak6215 2 месяца назад +3

      or even better: do it linux style? and don't take down the entire system if there is a recoverable error at boot

    • @somenameidk5278
      @somenameidk5278 2 месяца назад

      ​@@az-kalaak6215I'm pretty sure a corrupted kernel module like this would crash Linux as well.

  • @nimrodsmusic
    @nimrodsmusic 2 месяца назад

    This is the best and direct answer to the question. Every other big news outlet goes on and on and never actually tells us what went wrong. Well done

  • @typingcat
    @typingcat 2 месяца назад +7

    Wait, how could this happen. Don't they digitally-sign driver files? If so, an all-null file should not pass the signature verification, and how did Windows even load the driver? Windows rejects unsigned drivers, doesn't it? This makes no sense.

    • @iljaseklervl
      @iljaseklervl 2 месяца назад +2

      According to the video, it wasn't Windows. It was CrowdStrike kernel mode driver loading a submodule without any NULL checks and error handling.

    • @typingcat
      @typingcat 2 месяца назад +1

      @@iljaseklervl That is dumb. How could a security application do not check the integrity of its module files? This is not just a simple distribution mistake, but a fundamental amateurish dumb coding.

    • @nigh7swimming
      @nigh7swimming 2 месяца назад +1

      Agree, looks like the gist of the issue to me. Mistakes happen, but this is pure negligence in lack of any sanity check verification.

    • @john6372
      @john6372 Месяц назад

      if there are no checks.. sounds like a nice backdoor waiting to be exploited.

    • @NYYstateofmind
      @NYYstateofmind Месяц назад

      @@john6372sounds like it just was

  • @witchtheer3450
    @witchtheer3450 2 месяца назад +1

    "the wildest things in my 10 years" i feel like you are saying it every week :DD

  • @urizezucm256
    @urizezucm256 2 месяца назад +3

    is friday and the computer knows it

  • @aniketbisht2823
    @aniketbisht2823 2 месяца назад +2

    If anything Crowdstrike should lose all their credibility. Being trusted to deploy code that executes at the kernel level carries with it a huge responsibility. But we live in a world where people are okay with anti-cheat software having that sort of privilege so that they can play a game. Your operating system is supposed to be the last holdout against malicious and faulty applications (that's what we teach at school) but we are bending the rules for no good reason.

  • @aster.gemyni
    @aster.gemyni 2 месяца назад +3

    Rip the 5 hours of production data I lost at work

  • @ziprock
    @ziprock 2 месяца назад +2

    cool, appreciate the technical take on the issue. This will be a perfect example of what not to do.

  • @gameboardgames
    @gameboardgames 2 месяца назад +3

    So glad I'm making games today and not doing my usual IT gig.

  • @titfortat4405
    @titfortat4405 2 месяца назад +1

    The real Y2K was the C/C++ code vulnerabilities we wrote along the way

  • @Dead_Goat
    @Dead_Goat 2 месяца назад +6

    Crowdstrike is absolutely useless. All it does is monitor you employees it doesn't help.

  • @tallpaul9475
    @tallpaul9475 Месяц назад

    Your explanation of how the driver integrates to the system to make it depend on it makes sense. Thanks for giving informative details at an understanding level.

  • @rnbpl
    @rnbpl 2 месяца назад +18

    cybersecurity is such a meme industry. scaremongering followed by complete incompetence when it comes to the threats that matter most

    • @sacha9593
      @sacha9593 2 месяца назад +10

      Cybersecurity companies have very much a "Who watches the watchmen?" problem. They are given a ton of power in the name of security and they can do a lot of damage.

  • @MMedic23
    @MMedic23 Месяц назад

    Literally a "Come on you guys! There it is right in front of you the whole time! You're dereferencing a null pointer!" moment

  • @SkylerAnderson
    @SkylerAnderson 2 месяца назад +6

    What if crowdstrike runs falcon on their own workstations? Would it detect its own update as a virus?

    • @Turalcar
      @Turalcar 2 месяца назад

      No. all zeros is not a virus