…according to a Twitter post by the Chief Informational Security Officer of Grand Canyon Education.

So, does anyone else find it odd that the file that caused everything CrowdStrike to freak out, C-00000291-
00000000-00000032.sys was 42KB of blank/null values, while the replacement file C-00000291-00000000-
00000.033.sys was 35KB and looked like a normal, if not obfuscated sys/.conf file?

Also, apparently CrowdStrike had at least 5 hours to work on the problem between the time it was discovered and the time it was fixed.

  • diffusive@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    4 months ago

    If I had to bet my money, a bad machine with corrupted memory pushed the file at a very final stage of the release.

    The astonishing fact is that for a security software I would expect all files being verified against a signature (that would have prevented this issue and some kinds of attacks

    • Angry_Autist (he/him)@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      From my experience it was more likely to be an accidental overwrite from human error with recent policy changes that removed vetting steps.

        • Angry_Autist (he/him)@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 months ago

          Quick development will probably spell the end of the internet once AI code creation hits its stride. It’ll be like the most topheavy SCRUM you’ve ever seen with the devs literally incapable of disagreeing.

          I was thinking about his stint at McAfee, and I think you’re right. My real question is: will the next company he golden parachutes off to learn the lesson?

          I’m going to bet not.

    • BossDj@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      So here’s my uneducated question: Don’t huge software companies like this usually do updates in “rollouts” to a small portion of users (companies) at a time?

      • Dashi@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 months ago

        I mean yes, but one of the issuess with “state of the art av” is they are trying to roll out updates faster than bad actors can push out code to exploit discovered vulnerabilities.

        The code/config/software push may have worked on some test systems but MS is always changing things too.

      • Echo Dot@feddit.uk
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Companies don’t like to be beta testers. Apparently the solution is to just not test anything and call it production ready.

        • JasonDJ@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 months ago

          Every company has a full-scale test environment. Some companies are just lucky enough to have a separate prod environment.