this post was submitted on 19 Jul 2024
1201 points (99.5% liked)

Technology

59656 readers
2656 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

All our servers and company laptops went down at pretty much the same time. Laptops have been bootlooping to blue screen of death. It's all very exciting, personally, as someone not responsible for fixing it.

Apparently caused by a bad CrowdStrike update.

Edit: now being told we (who almost all generally work from home) need to come into the office Monday as they can only apply the fix in-person. We'll see if that changes over the weekend...

you are viewing a single comment's thread
view the rest of the comments
[–] scripthook@lemmy.world 45 points 4 months ago (3 children)

crowdstrike sent a corrupt file with a software update for windows servers. this caused a blue screen of death on all the windows servers globally for crowdstrike clients causing that blue screen of death. even people in my company. luckily i shut off my computer at the end of the day and missed the update. It's not an OTA fix. they have to go into every data center and manually fix all the computer servers. some of these severs have encryption. I see a very big lawsuit coming...

[–] chris@l.roofo.cc 12 points 4 months ago (1 children)

I don't see how they can recover from that. They will get lawsuits from all around the world.

[–] AWittyUsername@lemmy.world 7 points 4 months ago* (last edited 4 months ago)

I'm never financially recovering from this. - George Kurtz

[–] MataVatnik@lemmy.world 7 points 4 months ago* (last edited 4 months ago) (3 children)

they have to go into every data center and manually fix all the computer servers.

Jesus christ, you would think that (a) the company would have safeguards in place and (b) businesses using the product would do better due diligence. Goes to show thwre are no grown ups in the room inside these massive corporations that rule every aspect of our lives.

I'm calling it now. In the future there will be some software update for your electric car, and due to some jackass, millions of cars will end up getting bricked in the middle of the road where they have to manually be rebooted.

[–] arin@lemmy.world 4 points 4 months ago

Laid off one too many persons, finance bros taking over

[–] yesoutwater@lemm.ee 2 points 4 months ago (2 children)

I work for one of these behemoths, and there are a lot of adults in the room. When we began our transition off the prior, well known corporate AV, I never even heard of crowd strike.

The adults were asking reasonable questions: why such an aggressive migration timeline? Why can't we have our vendor recommended exclusion lists applied? Why does this need to be installed here when previously agentless technologies was sufficient? Why is crowd strike spending monies on a Superbowl ad instead of investing back into the technology?

Either something fucky is a foot, as in this was mandated to our higher ups to m make the switch (why?), or, as is typically the case, the decision was made already and this 'due diligence' is all window dressing to CYA.

Who gives a shit about fines on SLAs if your vendor is going to foot the bill.

[–] Mikina@programming.dev 2 points 4 months ago

Why does this need to be installed here when previously agentless technologies was sufficient

As someone who works in offensive Cybersecurity doing Red Teamings, where most of my job is to bypass and evade such solutions, I can say that bypassing agent less technologies is so much easier than agented ones. While you can access most of the logs remotely, having an agent helps you extremely with catching 0-day malware, since you can scan memory (that one is a bitch to bypass and usually how we get caught), or hook syscalls which you can then correlate.

Oh, an unknown unsigned process just called RWX memory allocation, loaded a crypto binary, and spawned a thread in another process that's trying to execute it? Better scan that memory and see what it's up to. That is something you cannot do remotely.

[–] MataVatnik@lemmy.world 1 points 4 months ago

Insane that these people are the ones making the decisions

[–] dan@upvote.au 6 points 4 months ago* (last edited 4 months ago) (3 children)

. they have to go into every data center and manually fix all the computer servers

Do they not have IPMI/BMC for the servers? Usually you can access KVM over IP and remotely power-off/power-on/reboot servers without having to physically be there. KVM over IP shows the video output of the system so you can use it to enter the UEFI, boot in safe/recovery mode, etc.

I've got IPMI on my home server and I'm just some random guy on the internet, so I'd be surprised if a data center didn't.

[–] stringere@sh.itjust.works 7 points 4 months ago (1 children)

I’d be surprised if a data center didn’t.

Then you'd be surprised.

[–] dan@upvote.au 1 points 4 months ago

I feel sorry for sys admins that have to administer servers in a remote data center and don't have KVM over IP.

[–] wizardbeard@lemmy.dbzer0.com 1 points 4 months ago (1 children)

Sometimes there are options that are reasonable for individual users that don't scale well to enterprise environments.

Also, the effectively gives attackers a secondary attack surface in addition to the normal remote access technologies that require the machine to be up and running to work.

[–] dan@upvote.au 1 points 4 months ago

I don't know many individual users that use IPMI. I only really see it used by hosting (and other) companies in data centers.

Also, the effectively gives attackers a secondary attack surface

IPMI is usually locked down and only accessible on a management VLAN, and also often IP locked, plus the system itself would have a password.