31 points

This is going to turn out it was a hack in several months right?

permalink
report
reply
15 points

Never attribute to maliciousness that which can be explained by incompetence.

That said, I’m sure the Crowdstrike CEO is currently on a phone call with three of their pet Congresscritters asking if they can get a $100M grant to harden their systems against Russia/China/NKorea/Antifa interference right now.

permalink
report
parent
reply
10 points

“Senator, we were hacked by gay furries.”

permalink
report
parent
reply
6 points

“We need to get more of our own gay furries! There’s a gay furry gap!”

permalink
report
parent
reply
2 points

While being simultaneously gang…handled by the unnamed 3-letter agencies representatives

permalink
report
parent
reply
3 points

If I ever become a super 1337 hacker I’m going to setup all of my exploits to look like it could be regular mismanagement, thanks for the advice

permalink
report
parent
reply
52 points

Won’t take that long, security researchers are already decompiling the update to see if it was malicious or incompetence.

permalink
report
parent
reply
-18 points

You won’t find the incompetence in the software no matter what.

If you fail to assume that the software contains issues – if you fail to understand that your software is made by humans and humans make mistakes, not because they’re bad but because they’re human – and if you fail to implement mechanisms to feel gracefully with inevitable failures, THAT is the incompetence.

Failures are systemic.

permalink
report
parent
reply
1 point

No idea why this relatively banal truth is getting so many downvotes

permalink
report
parent
reply
9 points

Systemic failures are incompetence.

permalink
report
parent
reply
33 points

Oh yes I make those failures myself, testing and staging and limited release schedules save my human failures from breaking the world

permalink
report
parent
reply
26 points

This is going to be Solarwinds all over again I can just smell it.

permalink
report
parent
reply
48 points

Hacks of this grade tend to be targeted, this is most likely incompetence.

permalink
report
parent
reply
0 points

Think big. This may have had a target. But hitting the target only wasn’t possible so everyone got hit.

It’s possible those responsible only had this weapon that was capable of hitting the target, maybe the plan was to disrupt world flights to make someone late tomorrow, who knows. Maybe poo-tin or Xi-the-Pooh wanted to hit America and its allies?

permalink
report
parent
reply
5 points
*

A state actor will use more precise techniques to attack specific targets. Think SolarWinds and Stuxnet.

Ransomware doesn’t apply here and tends to depend on phishing first anyway.

Even terrorists have specific targets in mind.

So it’s either Bond villains or incompetence.

Edit: The only way i can fit your comment would be an incompetent script kiddy. Even then, doesn’t make sense as all systems were not directly attacked, as would be the case, but rather through what would have to be a side-channel attack, so no.

permalink
report
parent
reply
5 points
*

A lot of companies will get calls from the “provider” offering help with mitigation so that additional features can also be installed. This is a time to be extra wary.

Edited: spelling

permalink
report
parent
reply
6 points
Deleted by creator
permalink
report
parent
reply
52 points
*

Company spyware. We have that on our devices. They used to have an “about” stored locally on the app, but removed it and a web connection is required to view the docs. Basically says it downloads/sees everything on your device and checks for threats. Thing is a few people have been fired for having things in their devices they shouldn’t. I didn’t ask what it was, nor did I hear how these things were “threats”, but nonetheless they were fired. Too many people treat company hardware like “free device, bro!” and put all sorts of personal stuff on the device. Most industries it’s probably not too big of a deal, but for mine if there’s an incident that happens when you were busy watching Netflix or something instead of doing your job you’re fucked. First thing they’ll do is check your device and crowdstrike to see what you were doing, and even if you weren’t watching Netflix all your personal data will be exposed.

permalink
report
reply
20 points

They definitely could, but most cybersecurity departments are paid too much to worry about minor items like that. If HR tells us to look into a specific user and gets the proper approvals so that everything is in compliance, we’ll definitely get someone on the team to do it, but otherwise if we happen to see evidence of unapproved usage, we’re mostly going to overlook it unless it could lead to something dangerous to your machine or the company as a whole.

EDRs like Crowdstrike can see very very nearly everything you do though, definitely everything you would care about.

permalink
report
parent
reply
2 points

Crowstrike Onstrike

permalink
report
reply
34 points

What a striking name… CrowdStrike heh. They definitely live up to it!

permalink
report
reply
3 points

More like CrashStrike

permalink
report
parent
reply
145 points

This is why you do staged rollouts of updates… not the entire planet at once.

permalink
report
reply
70 points

And don’t have automatic updates enabled for critical infrastructure.

permalink
report
parent
reply
-11 points

No, you run Linux with automatic secutity updates turned on

permalink
report
parent
reply
2 points

Can somebody explain why the down votes?

permalink
report
parent
reply
13 points

I don’t know exactly how crowd strike works, but this sounded like a “virus signatures” update (IE not a software update per se). And thats what caused the issue.

I think “real time virus protection” is why people use it so they expect the signatures to get updated asap/with little to no human intervention.

This is a crowd strike epic fail…for how they let their software blue screen systems with a virus signature update.

permalink
report
parent
reply
21 points

So true, this really highlights the risk of updates impacting critical systems vs critical systems being exposed to critical vulnerabilities. Its a real balancing act.

permalink
report
parent
reply
1 point

It actually highlights the risk of having unaudited third party software running on your critical infrastructure

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 17K

    Monthly active users

  • 6.1K

    Posts

  • 132K

    Comments