1233
Malware As A Service (sh.itjust.works)
top 50 comments
sorted by: hot top controversial new old
[-] Logh@lemmy.ml 133 points 1 year ago

Funny how CrowdStrike already sounds like some malware’s name.

[-] dmention7@lemm.ee 74 points 1 year ago

It literally sounds like a DDoS!

[-] bruhduh@lemmy.world 22 points 1 year ago

Botnet if you will

[-] SkyNTP@lemmy.ml 22 points 1 year ago

Not too surprising if the people making malware, and the people making the security software are basically the same people, just with slightly different business models.

[-] Excrubulent@slrpnk.net 11 points 1 year ago* (last edited 1 year ago)

Reminds me of the tyre store that spreads tacks on the road 100m away from their store in the oncoming lanes.

People get a flat, and oh what do you know! A tyre store! What a lucky coincidence.

[-] Eylrid@lemmy.world 7 points 1 year ago

Classic protection racket. "Those are some nice files you've got there. It'd be a shame if anything happened to them..."

[-] JackbyDev@programming.dev 3 points 1 year ago

It sounds like the name of a political protest group.

[-] Carighan@lemmy.world 125 points 1 year ago

This is, in a lot of ways, impressive. This is CrowdStrike going full "Hold my beer!" about people talking about what bad production deploy fuckups they made.

I'm volunteering to hold their beer.

Everyone remember to sue the services not able to provide their respective service. Teach them to take better care of their IT landscape.

[-] ricecake@sh.itjust.works 24 points 1 year ago

Typically auto-applying updates to your security software is considered a good IT practice.

Ideally you'd like, stagger the updates and cancel the rollout when things stopped coming back online, but who actually does it completely correctly?

Applying updates is considered good practice. Auto-applying is the best you can do with the money provided. My critique here is the amount of money provided.

Also, you cannot pull a Boeing and let people die just because you cannot 100% avoid accidents. There are steps in between these two states.

[-] ricecake@sh.itjust.works 28 points 1 year ago

you cannot pull a Boeing and let people die

You say that, but have you considered the savings?

[-] Iheartcheese@lemmy.world 21 points 1 year ago

People are temporary. Money is forever.

[-] KomfortablesKissen@discuss.tchncs.de 7 points 1 year ago* (last edited 1 year ago)

I have. They are not mine. The dead people could be.

Edit: I understand you were being sarcastic. This is a topic where I chose to ignore that.

[-] ricecake@sh.itjust.works 8 points 1 year ago

That's totally fair. :)

I work at a different company in the same security space as cloudstrike, and we spend a lot of time considering stuff like "if this goes sideways, we need to make sure the hospitals can still get patient information".

I'm a little more generous giving the downstream entities slack for trusting that their expensive upstream security vendor isn't shipping them something entirely fucking broken.
Like, I can't even imagine the procedureal fuck up that results in a bsod getting shipped like that. Even if you have auto updates enabled for our stuff, we're still slow rolling it and making sure we see things being normal before we make it available to more customers. That's after our testing and internal deployments.

I can't put too much blame on our customers for trusting us when we spend a huge amount of energy convincing them we can be trusted to literally protect all their infrastructure and data.

I can put the blame to your customers. If I make a contract with a bank they are responsible for my money. I don't care about their choice of infrastructure. They are responsible for this. They have to be sued for this. Same for hospitals. Same for everyone else. Why should they be exempt from punishment for not providing the one service they were trusted to provide? Am I expected to feel for them because they made the "sensible choice" of employing the cheapest tools?

This was a business decision to trust someone external. It should not be tolerated that they point their fingers elsewhere.

[-] ricecake@sh.itjust.works 2 points 1 year ago

Can't fault you for feeling that way. I definitely don't think anyone should be exempt from responsibility, I meant blame in the more emotional "ugh, you jerk" sense.

If someone can't fulfill their responsibilities because someone they depended on failed them, they're still responsible for that failure to me, but I'm not blaming them if that makes any sense.

Power outage or not, the store owes me an ice cream cake and they need to make things even between us, but I'm not upset with them for the power outage.

load more comments (3 replies)
[-] bleistift2@sopuli.xyz 3 points 1 year ago

You seem knowledgable. I’m surprised that it’s even possible for a software vendor to inject code into the kernel. Why is that necessary?

[-] ricecake@sh.itjust.works 5 points 1 year ago

The kernel is responsible for managing hardware and general low-level system operations. Anything that wants to do those things needs to get itself into kernel mode one way or another.

The typical way you do this is called a "driver" and no one thinks about them as being kernel code. Things like graphics cards and the like.

Things that want to do actions like monitor network traffic or filesystem activity system wide or in a lower level capacity than the normal tools provide also need to be kernel level.
In a security context, that specifically would include things that want to monitor raw packets rather than the parsed content that assumes the packet is well formed in a way that a malicious one might not be.

Cloudstrike does the same thing on Linux, and the typical tools for network management or advanced security are also either compiled in or loadable kernel modules.
It's easy to forget that ip/ebtables and selinux and friends are kernel level software frequently distributed as kernel modules, in the case of the firewalls, or compiled in with a special framework and not just user mode software.

load more comments (4 replies)
load more comments (1 replies)
[-] clearedtoland@lemmy.world 22 points 1 year ago

What’s the saying about dying a hero or becoming the villain?

[-] aniki@lemmy.zip 20 points 1 year ago

ItS NoT A wInDoWs PrObLeM -- Idiots, even on Lemmy

[-] ricdeh@lemmy.world 43 points 1 year ago

I genuinely can't tell at whom you are addressing this. Those claiming it is a Windows problem or those that say otherwise?

[-] daellat@lemmy.world 25 points 1 year ago

Hi, idiot here. Can you explain how it is a windows problem?

[-] aniki@lemmy.zip 8 points 1 year ago* (last edited 1 year ago)

If you patch a security vulnerability, who's fault is the vulnerability? If the OS didn't suck, why does it need a 90 billion dollar operation to unfuck it?

Redhat is VALUED at less than that.

https://pitchbook.com/profiles/company/41182-21

It's a fucking windows problem.

[-] ricecake@sh.itjust.works 45 points 1 year ago* (last edited 1 year ago)

Sure, but they weren't patching a windows vulnerability, windows software, or a security issue, they were updating their software.

I'm all for blaming Microsoft for shit, but "third party software update causes boot problem" isn't exactly anything they caused or did.

You also missed that the same software is deployed on Mac and Linux hosts.

Hell, they specifically call out their redhat partnership: https://www.crowdstrike.com/partners/falcon-for-red-hat/

[-] xtr0n@sh.itjust.works 15 points 1 year ago

Crowdstrike completely screwed the pooch with this deploy but ideally, Windows wouldn’t get crashed by a bas 3rd party software update. Although, the crashes may be by design in a way. If you don’t want your machine running without the security software running, and if the security software is buggy and won’t start up, maybe the safest thing is to not start up?

[-] MangoPenguin 22 points 1 year ago

Are we acting like Linux couldn't have the same thing happen to it? There are plenty of things that can break boot.

CrowdStrike also supports Linux and if they fucked up a Windows patch, they could very well fuck up a linux one too. If they ever pushed a broken update on Linux endpoints, it could very well cause a kernel panic.

[-] ricecake@sh.itjust.works 13 points 1 year ago

Yeah, it's a crowd strike issue. The software is essentially a kernel module, and a borked kernel module will have a lot of opportunities to ruin stuff, regardless of the OS.

Ideally, you want your failure mode to be configurable, since things like hospitals would often rather a failure with the security system keep the medical record access available. :/. If they're to the point of touching system files, you're pretty close to "game over" for most security contexts unfortunately. Some fun things you can do with hardware encryption modules for some cases, but at that point you're limiting damage more than preventing a breach.

Architecture wise, the windows hybrid kernel model is potentially more stable in the face of the "bad kernel module" sort of thing since a driver or module can fail without taking out the rest of the system. In practice.... Not usually since your video card shiting the bed is gonna ruin your day regardless.

load more comments (1 replies)
[-] Solemarc@lemmy.world 17 points 1 year ago

Maybe this is a case of hindsight being 20/20 but wouldn't they have caught this if they tried pushing the file to a test machine first?

[-] tabularasa@lemmy.ca 13 points 1 year ago

It's not hindsight, it's common sense. It's gross negligence on CS's part 100%

[-] JackbyDev@programming.dev 3 points 1 year ago

Well, it is hindsight 20/20... But also, it's a lesson many people have already learned. There's a reason people use canary deployments lol. Learning from other people's failures is important. So I agree, they should've seen the possibility.

[-] Gsus4@programming.dev 13 points 1 year ago

I saw one rumor where they uploaded a gibberish file for some reason. In another, there was a Windows update that shipped just before they uploaded their well-tested update. The first is easy to avoid with a checksum. The second...I'm not sure...maybe only allow the installation if the windows update versions match (checksum again) :D

[-] dariusj18@lemmy.world 4 points 1 year ago

Windows has beta channels for their updates

[-] undu@lemmy.world 5 points 1 year ago

It's a sequence of problems that lead to this:

  • The kernel driver should have parsed the update, or at a minimum it should have validated a signature, before trying to load it.
  • There should not have been a mechanism to bypass Microsoft's certification.
  • Microsoft should never have certified and signed a kernel driver that loads code without any kind signature verification, probably not at all.

Many people say Microsoft are not at fault here, but I believe they share the blame, they are responsible when they actually certify the kernel drivers that get shipped to customers.

[-] slazer2au@lemmy.world 14 points 1 year ago

Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)

[-] marcos@lemmy.world 8 points 1 year ago

Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.

[-] pkill@programming.dev 10 points 1 year ago

SHOULD'VE USED OPENBSD LMAO

[-] Ptsf@lemmy.world 8 points 1 year ago* (last edited 1 year ago)
load more comments
view more: next ›
this post was submitted on 19 Jul 2024
1233 points (100.0% liked)

Programmer Humor

26772 readers
1111 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS