首页
15 条评论
jpgvm10 个月前
The correct lesson is to stop introducing more vulns into your systems by running "security" products. Crowdstrike was just an outage but could have just has easily been Solarwinds 2.0.<p>Crowdstrike is probably less bad than the alternatives that I have run into that are largely developed by very low cost engineers <i>cough</i> TrendMicro <i>cough</i> but even so, they aren't NT kernel engineers nor do they have the NT kernel release process.<p>Companies need to find ways to live without this crap or this will keep happening and it will be a lot worse one day. Self-compromising your own systems with RATs/MDMs/EDR/XDR/whatever other acronym soup needed to please the satanic CISSPs are just terrible ideas in general.
评论 #41032506 未加载
评论 #41031472 未加载
评论 #41031528 未加载
评论 #41041692 未加载
评论 #41042276 未加载
评论 #41044859 未加载
评论 #41031546 未加载
theoa10 个月前
You are only as good as your weakest link:<p>> A Microsoft spokesman said it cannot legally wall off its operating system in the same way Apple does because of an understanding it reached with the European Commission following a complaint. In 2009, Microsoft agreed it would give makers of security software the same level of access to Windows that Microsoft gets.<p><a href="https://www.wsj.com/tech/cybersecurity/microsoft-tech-outage-role-crowdstrike-50917b90?st=pkas1bzrhcoj0os&reflink=desktopwebshare_permalink" rel="nofollow">https://www.wsj.com/tech/cybersecurity/microsoft-tech-outage...</a>
评论 #41031685 未加载
评论 #41031739 未加载
评论 #41041548 未加载
mylastattempt11 个月前
I found the article unbearable and just a convoluted way to say: this incident would have had a lot less impact if CrowdStrike had less customers or more competitors. A real page filler without any insight or solutions, just look at this paragraph, completely void of anything useful.<p>> This time, the digital cataclysm was caused by well-intentioned people who made a mistake. That meant the fix came relatively quickly; CrowdStrike knew what had gone wrong. But we may not be so lucky next time. If a malicious actor had attacked CrowdStrike or a similarly essential bit of digital infrastructure, the disaster could have been much worse.<p>Gee, the damage from an honest mistake (what does the author even base that on) is most likely easier to fix than the damage done by a malicious actor with bad intent. I feel so enlightened!
评论 #41031367 未加载
评论 #41031359 未加载
评论 #41036931 未加载
teeheelol10 个月前
The warning in this case is hire security people who actually have a clue and include vendor software in their risk assessment.<p>Literally every time I see stuff like this go down, the security software had exactly zero engineering research put into it whereas everything else did.<p>If people did this, CrowdStrike would either not exist or look completely different.
Kaibeezy11 个月前
<a href="https://archive.md/pyW91" rel="nofollow">https://archive.md/pyW91</a>
wruza10 个月前
It was a seizure, not warning. More stupid bandaids will be slapped in a hurry without considerations from people who understand how this tumor works.
iwontberude10 个月前
Having monopolies and oligopolies is like having a small gene pool.
zelon8810 个月前
The culture at MS$ is to servitize enough of their products and then force customers to use them. That way, the products won't be so exposed to users and Microsoft will be able to limit their own liability without actually improving the back end product.<p>Servitization is a clever way to consolidate your perpetual licensed customers over to perpetual service contacts, while also further obfuscating and locking down the underlying operating environment.<p>This is in the best interest of Microsoft bottom line, at the expense of all private business, government, or anyone who values consumer experience really. It reduces the number of drive-by security incidents, but when WW3 happens and 75% of our economy is hosted in a whopping 12 datacenters across 3 companies I'm sure we'll be screwed. I mean just depth charging Google fiber today would probably take down 25% of the world economy.
akira250110 个月前
"Was a Warning."<p>No. It was just a failure. The warnings have been trumpeted for decades.<p>It should have been no surprise that the giant company that was trusted to secure our single source of OS software against "supply chain attacks" ended up committing the largest "supply chain attack" yet seen on Earth.<p>We are effectively still in the wild west. The gold rush has to end before we can truly civilize the place.
jijji10 个月前
is it true that the owner of crowdstrike is an ex-employee of McAfee and the same company that got sold because they had massive downtime for basically the same reason
评论 #41031634 未加载
gquere10 个月前
The article advocates for even <i>more</i> market fragmentation? Even though that isn't the issue at all?
mannyv10 个月前
If these machines were backend systems (which most of the ones that mattered were), you have to ask: why are they running malware detection when they should have minimal-to-no surface area for an attacker?<p>That's the real question here.
blooalien10 个月前
Sorry, but if <i>decades</i> of warnings from qualified security <i>actual experts</i> who were <i>hired</i> specifically <i>for</i> their <i>expertise</i> in such matters went ignored enough for <i>long</i> enough to reach this point, then <i>this</i> incident isn't gonna change much anything. It'll be news for a short while, then forgotten. No lessons will have been learned, and few if any changes will be made. More things <i>like</i> this <i>will</i> happen in the future. Guaranteed...
mikewarot10 个月前
I'm a grumpy old man on the internet.... let's just get that out of the way<p>The root cause is NOT capitalism, nor is it users, Microsoft, or even CrowdStrike. You can't legislate, regulate, or "be more careful next time" your way out of this. Hell, blaming the users won't even work.<p>Here are 3 stories:<p>---<p>Imagine yourself as an inspector for the Army. The 17th Fortress has exploded this month, and nobody can figure out why. You've checked all the surviving <i>off-site</i> records, and are reasonably sure that the crates of dynamite that used to make up the foundations and structure of the cart were properly inspected, and even updated on a regular basis.<p>You more closely inspect the records, looking for any possible soldier or supplier who might have caused this loss. It might possibly be communist infiltration, or one of those pacifists!<p>You encounter an old civilian, who remembers a time when forts were built out of wood or bricks, and suggests that. But he's not a professional solder, what could he know.<p>---<p>Imagine you're a fire inspector. You've been to your 4th case this month of complete electrical network outage. This time, the cause seems to be that Lisa Douglas at Green Acres had Eb Dawson climb the pole, and he plugged in one too many appliances to the electricial.<p>If only there were a way to make sure that an overload anywhere couldn't take down the grid, and ruin so many people's days. You desperately want a day without house fires, and so many linemen being called out to test and repair circuits before connecting them back to the grid.<p>It will take some time before the boilers and generators get back on line from their cold re-start. In the mean while, business in town has ground to a halt.<p>The paperwork and processes to track and certify each appliance doesn't seem efficient.<p>There's this grumpy old guy who talks about fuses and circuit breakers, but he's just a crank.<p>---<p>The United States found itself embedded in yet another foreign entanglement in VietNam. There was a severe problem planning air strikes, because there were multiple sources required to plan them, and no single computer could be trusted with both of them. The strikes themselves were classified, but the locations of the enemy radar installations couldn't be trusted to the computers, because they were occasionally accessed by enemy sources. Thus the methods and means of locating the enemy radar equipment could become known, and thus rendered ineffective.<p>A study was done[1], and the problems were solved. There were systems based on the results of these studies[5], and they worked well.[2] Unfortunately, people thought that it was un-necessary to incorporate these measures, and they defaulted to the broken <i>ambient authority</i> model we're stuck with today. Here's some more reading, if you're interested.[3]<p>---<p>If you're bored... I've even got a conspiracy theory that explains how I think we actually got here, it it wasn't simply historical forces (which I think it was, 95% certainty).[4] If true, those forces would still be here today, actively suppressing any such stories.<p>[1] <a href="https://csrc.nist.rip/publications/history/ande72.pdf" rel="nofollow">https://csrc.nist.rip/publications/history/ande72.pdf</a><p>[2] <a href="https://srl.cs.jhu.edu/pubs/SRL2003-02.pdf" rel="nofollow">https://srl.cs.jhu.edu/pubs/SRL2003-02.pdf</a><p>[3] <a href="https://github.com/dckc/awesome-ocap">https://github.com/dckc/awesome-ocap</a><p>[4] <a href="https://news.ycombinator.com/item?id=40107150">https://news.ycombinator.com/item?id=40107150</a><p>[5] <a href="https://web.archive.org/web/20120919111301/http://www.albany.edu/acc/courses/ia/classics/belllapadula1.pdf" rel="nofollow">https://web.archive.org/web/20120919111301/http://www.albany...</a>
评论 #41031611 未加载
评论 #41031880 未加载
评论 #41031680 未加载
Falkon131310 个月前
What baffles me is just how many IT personnel in so many organizations around the world apparently just blindly hit the "Deploy this zero-day update to all production systems without any testing" button instead of the "Test this update on our test systems first" button.<p>Or maybe even just looking up the update online to see whether any problems had been reported before deploying it wholesale across their organizations.<p>Are these the same IT people whose systems all went offline in the left-pad incident because they 'accidentally' set their production servers to be dependent on a third-party repository?<p>I've worked at some low-budget places that didn't have much in the way of a vetting process, but even there auto-deploying unknown updates to third-party dependencies into production was always a capital N No.
评论 #41032011 未加载
评论 #41040435 未加载