Zum Inhalt der Seite gehen


Crowdstrike published a faulty update. Causes Windows to bluescreen. Driver is C-00000291*.sys. Will cause worldwide outages. Thread follows, I suspect. 🧵
Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

I am obtaining a copy of the driver to see if malicious or bad coding, if anybody else checking let me know.
Als Antwort auf Kevin Beaumont

If anybody is wondering the impact of the Crowdstrike thing - it’s really bad. Machines don’t boot.

The recovery is boot in safe mode, log in as local admin and delete things - which isn’t automateable. Basically Crowdstrike will be in very hot water.

Als Antwort auf Kevin Beaumont

Favour to IT folks fixing - could you please copy the C-00000291*.sys file to somewhere and upload it to Virustotal, and reply with the Virustotal link or file hash? It's still unclear if the update was malicious or just a bug.
Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

I've obtained copies of the .sys driver files Crowdstrike customers have. They're garbage. Each customer appears to have a different one.

They trigger an issue that causes Windows to blue screen.

I am unsure how these got pushed to customers. I think Crowdstrike might have a problem.

For any orgs in recovery mode, I'd suspend auto updates of CS for now.

Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

If anybody is wondering, the update was delivered via channel file updates in Crowdstrike.
Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

BBC tracker (they mix up an earlier Microsoft outage, what they're actually tracking is the Crowdstrike issue) bbc.co.uk/news/live/cnk4jdwp49…
Als Antwort auf Kevin Beaumont

The .sys files causing the issue are channel update files, they cause the top level CS driver to crash as they're invalidly formatted. It's unclear how/why Crowdstrike delivered the files and I'd pause all Crowdstrikes updates temporarily until they can explain.

This is going to turn out to be the biggest 'cyber' incident ever in terms of impact, just a spoiler, as recovery is so difficult.

Als Antwort auf Kevin Beaumont

I'm seeing people posting scripts for automated recovery.. Scripts don't work if the machine won't boot (it causes instant BSOD) -- you still need to manually boot the system in safe mode, get through BitLocker recovery (needs per system key), then execute anything.

Crowdstrike are huge, at a global scale that's going to take.. some time.

Als Antwort auf Kevin Beaumont

Crowdstrike statement: bbc.co.uk/news/live/cnk4jdwp49…

Basically 'it's not a security incident... we just bricked a million systems'

Als Antwort auf Kevin Beaumont

Hope nobody had any plans for the weekend #crowdstrike
Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

For anybody wondering why Microsoft keep ending up in the frame, they had an Azure outage and- this may be news to some people- a lot of Microsoft support staff are actually external vendors, eg TCS, Mindtree, Accenture etc.

Some of those vendors use Crowdstrike, and so those support staff have no systems.

But MS isn’t the outage cause today.

Als Antwort auf Kevin Beaumont

By far my fave thing with the Crowdstrike thing is Microsoft saying to try turning impacted PCs off and on again in a loop until you get the magic reboot where CrowdStrike updates before it blue screens.
Als Antwort auf Kevin Beaumont

The chuckle brothers at NoName attempting to claim they caused the incident. To be super clear, NoName can barely DDoS a bike shed website, and once asked me to make their logo in Minecraft.
Als Antwort auf Kevin Beaumont

Probably the funniest BBC news update so far (they’ve cleared the airways for this incident).
Als Antwort auf Kevin Beaumont

BBC News at 6 is leading the entire show with this. (They asked me to appear but I was slightly busy).

For the record I spent much of the day trying to tell people it isn’t a Microsoft issue.

Als Antwort auf Kevin Beaumont

When I get successfully DDoS’d it’s both a security incident and I’m not protected…
Als Antwort auf Kevin Beaumont

Billboards in Times Square blue screen of deathing. Nice way to find out which orgs use Crowdstrike, this 🤣

Source is BBC News, if anybody wondering.

Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

Crazy video of flights being ground stopped across the US earlier today, due to the CrowdStrike issue. bbc.co.uk/news/live/cnk4jdwp49…
Als Antwort auf Kevin Beaumont

Photos of CrowdStrike issue theverge.com/24202037/microsof…
Als Antwort auf Kevin Beaumont

CrowdStrike have effectively a mini root cause analysis out

Pretty much as everybody knows, they did a channel update and it caused the driver to crash.

If they blame the person who did the update.. they shouldn’t, as it sounds like an engine defect.

crowdstrike.com/blog/technical…

Als Antwort auf Kevin Beaumont

For the people thinking ‘shouldn’t testing catch this?’, the answer is yes. Clearly something went wrong.

This isn’t CrowdStrike’s first rodeo on this, although it is the most severe incident so far.

Eg just last month they had an issue where a content update pushed CPU to 100% on one core: thestack.technology/crowdstrik…

Truthfully these issues happen across all vendors - I’ve had my orgs totalled twice now by AV vendors, one while I was on holiday abroad and had to suspend said holiday.

Als Antwort auf Kevin Beaumont

Btw, that isn’t to excuse it or any vendor. CrowdStrike have gotta be better at this stuff. And they’ll have to, as if they aren’t transparent customers will flee.

It’s a warning shot to all AV/EDR/XDR vendors that if you fuck up availability, your brand will become failure. It’s harsh but that’s the media cycle and modern world.

Als Antwort auf Kevin Beaumont

Microsoft estimate almost 9 million Windows devices are impacted by the CrowdStrike incident (likely from crash telemetry). blogs.microsoft.com/blog/2024/…
Als Antwort auf Kevin Beaumont

The Verge has a quick look at the orgs trying to recover from the Crowdstrike incident.

If you’re wondering why it’s dropped off the radar of most press, they think it’s over as Down Detector looks okay (which, to be clear, is not good logic).

theverge.com/2024/7/21/2420296…

Als Antwort auf Kevin Beaumont

Interesting - did anybody keep a list of tweets by CrowdStrike staff during the start of the incident? This one has been deleted. x.com/brody_n77/status/1814186…
Als Antwort auf Kevin Beaumont

US House committee calls on CrowdStrike CEO to testify on global outage washingtonpost.com/technology/…
Als Antwort auf Kevin Beaumont

Crowdstrike are touting auto remediation of blue screen as an opt in feature.

However, I just tried it - it’s not very successful, most boots still blue screen of death. I think CS need to be careful on messaging about this as it sounds like they’re offering it as a silver bullet. It only works if networking kicks in and the agent updates before Windows finishes booting.

reddit.com/r/sysadmin/comments…

Als Antwort auf Kevin Beaumont

Delta cancelled another 20% of US flights yesterday as they struggle to recover from CrowdStrike incident bankinfosecurity.com/blogs/cro…
Als Antwort auf Kevin Beaumont

CrowdStrike have published a video on YouTube about how to remediate PCs: youtube.com/watch?v=Bn5eRUaMZX…

(Despite the name, Self-Remediation, it is manual).

Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

Upguard have published a list of companies they say are impacted by the CrowdStrike 'Global IT Outage', based on public reporting.

upguard.com/crowdstrike-outage

Edit: obviously it’s missing most companies as most companies aren’t disclosing publicly.

Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

If anybody wonders what the file that took down 8.5 million Windows systems looks like.. it was 41kb in size. The only validity checking I can see CrowdStrike driver does is to check the first few bytes match the pattern seen in the screenshot before loading and executing.
Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

The US Department of Transport has opened an investigation into Delta over the disruption related to CrowdStrike incident.

Good luck to the CrowdStrike account manager for Delta.

Als Antwort auf Kevin Beaumont

The initial Post Incident Review is out from CrowdStrike. It’s good and really honest.

There’s some wordsmithing (eg channel updates aren’t code - their parameters control code).

The key take away - channel updates are currently deployed globally, instantly. They plan to change this at a later date to operate in waves. This is smart (and what Microsoft do for similar EPP updates).

crowdstrike.com/falcon-content…

Als Antwort auf Kevin Beaumont

By ‘this is smart’ I mean ‘this is smart… now’. Obviously they shouldn’t have been globally, simultaneously deploying kernel driver parameter changes across all customers: it was waiting to go wrong.

They still are btw, as it will take a while to engineer the correct way of doing it.

Als Antwort auf Kevin Beaumont

On insurance and CrowdStrike, Parametrix claim amongst just the Fortune 500 companies, they are facing $5.4bn in losses, of which around 10% will be covered by insurance.
theguardian.com/technology/art…
Als Antwort auf Kevin Beaumont

If you want to know something crazy:

- This year TCS migrated their EDR to CrowdStrike
- Then they announced a strategic partnership with CrowdStrike
- Then they lost all their systems
- They’re just finishing recovery today, 6 days in
- Then they got a $10 Uber Eats voucher
- …which got cancelled due to Uber flagging CrowdStrike’s account as fraudulent

Als Antwort auf Kevin Beaumont

Questions for your EDR providers (do not assume they are experts in availability):

- What are your different update processes?
- How do you test them?
- Do you dogfood test them?
- Do you roll them out in waves? What are the details, eg what percentages and when?
- Do you monitor failures and roll back?

Als Antwort auf Kevin Beaumont

CrowdStrike staff members are selling CrowdStrike monopoly sets they were given on eBay.
Als Antwort auf Kevin Beaumont

CrowdStrike filed at 8-K with the SEC on July 22nd for a cybersecurity incident. board-cybersecurity.com/incide…
Als Antwort auf Kevin Beaumont

Microsoft are talking about changes to Windows after the CrowdStrike incident. Good.

theverge.com/2024/7/26/2420671…

Als Antwort auf Kevin Beaumont

There’s a really good discussion on @riskybusiness’s YouTube show about the CrowdStrike incident.

About the 3 minute mark @alex made me realise I was far too kind to CrowdStrike. He rightly rips them apart.

youtu.be/EGRqtscp4eE

Als Antwort auf Kevin Beaumont

Delta are looking to sue CrowdStrike and Microsoft. HT @hrbrmstr

cnbc.com/2024/07/29/delta-hire…

Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

Re the Delta case - the lawyer they’ve hired successfully sued Microsoft previously on behalf of the US government, and the decision was upheld on appeal too. The ruling almost lead to the breaking up of Microsoft.

The following US government backed out of the case.

Bill Gates said at the time the lawyer was “out to destroy Microsoft”.

So there’s a chance here the CrowdStrike incident may end up having implications across vendor industry around warranties etc, we’ll see.

Als Antwort auf Kevin Beaumont

Replacing an XDR platform at scale takes some time, so if you’re wondering what the translation of Elon’s tweet about Crowdstrike is:

Elon: can we replace Crowdstrike?
Somebody: yes, we’ll begin looking into it but..
Elon: job done

Of course.. given how the Twitter takeover happened maybe he just got them to uninstall it and #yolosec

Dieser Beitrag wurde bearbeitet. (10 Monate her)
Unbekannter Ursprungsbeitrag

mastodon - Link zum Originalbeitrag
Andi Barth
@isotopp Well, everyone has an test environment. I just prefer that it is not the same as my production environment.
Unbekannter Ursprungsbeitrag

mastodon - Link zum Originalbeitrag
Felix Dreissig
@isotopp Definitely not surprized if they were unsigned, but do you have definite confirmation on that part?
Unbekannter Ursprungsbeitrag

mastodon - Link zum Originalbeitrag
Kevin Beaumont
Spirit Airlines in the US anticipates a $7.2 million hit to its third-quarter operating income due to operational disruptions caused by the CrowdStrike incident, which forced the carrier to cancel 470 flights.
Als Antwort auf Kevin Beaumont

Here's the Delta boss on his thoughts about the CrowdStrike incident.

They had 40k Windows Server boxes alone, all with BitLocker full disk encryption enabled, all of which wouldn't boot and weren't fixable without manually unlocking BitLocker. That had gone all in with CrowdStrike + Microsoft's most premium offerings.

He has a really good point about how tech companies have become obsessed with growth as their only metric of success, and customer satisfaction is not on the radar.

Unbekannter Ursprungsbeitrag

mastodon - Link zum Originalbeitrag
Kevin Beaumont
CrowdStrike shareholders are suing CrowdStrike bbc.com/news/articles/cy08ljxn…
Als Antwort auf Kevin Beaumont

CrowdStrike made a net loss of $845m between 2018 until this year, and has taken on $743m of debt during this period.
Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

@paul_ipv6 the obsession with growth comes right out of Friedman and the myth of shareholder value and can be tied to the rise of the Harvard Business School MBA in the 1960s and 70s. Combine with trickle down economics and the downright wrong Laffer curve and voila, the “what have you done for me this quarter?” mentality.

And we no longer have reasonable choices in anything.

Unbekannter Ursprungsbeitrag

mastodon - Link zum Originalbeitrag
Ryan Castellucci
FrEeZe PeAcH
Unbekannter Ursprungsbeitrag

mastodon - Link zum Originalbeitrag
Kevin Beaumont

CrowdStrike complained to Cloudflare about a CrowdStrike parody site… and Cloudflare took it down. Without a court order. clownstrike.lol/crowdmad/

Cloudflare recently announced they have become a strategic partner with CrowdStrike: cloudflare.com/en-gb/press-rel…

Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

There's a really mad moment in that interview where they ask them what assistance CrowdStrike have offered, and he essentially says nothing, not even a lunch voucher.

What a time to be alive.

Als Antwort auf Kevin Beaumont

Additionally to loop this in, CrowdStrike submitted a takedown for a parody label (they’ve since rescinded it after being called out).
Unbekannter Ursprungsbeitrag

mastodon - Link zum Originalbeitrag
Kevin Beaumont

If anybody wants the subtext of what is happening here, CrowdStrike and Microsoft both really do not want to get sued by Delta and have it go to court as it would potentially be explosive for both orgs and the wider security industry.

The customers are always plebs to be milked, as is status quo.

Als Antwort auf Kevin Beaumont

CrowdStrike incident root cause analysis is out.

Overall, good… but.

It is very verbose but doesn’t say much. Some of the wording will confuse people - eg it talks about rings (waves) in a way which makes you think it is already implemented. It isn’t. They’re saying they plan to implement it later.

Channel updates weren’t tested on a real Windows PC prior to deployment, they relied on automated bespoke code testing. They don’t mention that and it’s the real reason.

crowdstrike.com/wp-content/upl…

Unbekannter Ursprungsbeitrag

mastodon - Link zum Originalbeitrag
Kevin Beaumont

I've written up a bit about CrowdStrike's latest bold strategy.

doublepulsar.com/crowdstrike-t…

Als Antwort auf Kevin Beaumont

Microsoft have now queued up to try publicly throw their customer under the bus, claiming (without evidence) Delta’s CrowdStrike woes were due to non-Windows systems. The CrowdStrike issue only impacted Windows systems so I hope somebody at Microsoft knows what they are doing.

theverge.com/2024/8/6/24214371…

Unbekannter Ursprungsbeitrag

mastodon - Link zum Originalbeitrag
Kevin Beaumont
CrowdStrike are publicly threatening their customer, Delta. theverge.com/2024/8/5/24213521…
Unbekannter Ursprungsbeitrag

mastodon - Link zum Originalbeitrag
Kevin Beaumont
EFF are calling for antitrust action after the CrowdStrike incident eff.org/deeplinks/2024/07/crow…
Als Antwort auf Kevin Beaumont

Bloomberg report a vast majority of the CrowdStrike losses reported by customers will be judged by insurance as not covered by policies. bloomberg.com/news/articles/20…
Als Antwort auf Kevin Beaumont

We’ve reached the part of the brand cycle where people are using CrowdStrike as an excuse theverge.com/2024/8/2/24212298…
Als Antwort auf Kevin Beaumont

360 takes a look at the Crowdstrike kernel drivers - finds they implement an eBPF like system, contain a wide attack surface, don’t check validity of update files (eg no signing of updates) and claim they contain conditions for LPE and RCE vulnerabilities. mp.weixin.qq.com/s/uD7mhzyRSX1…

Before people write this off as ‘the Chinese’, I’ll give you a hint: there really, really should be security research about the security of security products across all vendors. I’ve seen things.

Dieser Beitrag wurde bearbeitet. (10 Monate her)
Als Antwort auf Kevin Beaumont

Previously on Crowdstrike Falcon vulnerability research, check out this timeline where they tried to use NDAs to avoid disclosure, then fixed it without telling anybody. modzero.com/modlog/archives/20…