It's not just CrowdStrike – the cyber sector is vulnerable
A faulty update from CrowdStrike's Falcon Sensor caused a global outage, impacting various industries. Stock market reacted negatively. Incident raises concerns about cybersecurity reliance, industry concentration, and the need for resilient tech infrastructure.
Read original articleA faulty content update from CrowdStrike's Falcon Sensor product caused a global outage affecting businesses worldwide, including airlines, banks, and broadcasters. The incident highlights concerns about quality control and reliance on third-party cybersecurity providers. The stock market reacted with CrowdStrike's shares opening down 9.5%. The incident may lead to a reevaluation of outsourcing critical functions and an increase in internal IT teams. Concentration risk in the cybersecurity industry is also a concern, with a few companies dominating the market. The incident underscores the need for diversification and redundancy in systems to prevent such widespread failures in the future. Clients, governments, and regulators are urged to consider building more resilient tech infrastructure. The cyber sector's vulnerability extends beyond CrowdStrike, prompting a broader discussion on cybersecurity practices and risk management.
Related
Cybersecurity platform Crowdstrike down worldwide, users logged out of systems
CrowdStrike, a cybersecurity platform, faced a global outage affecting users in countries like India, Japan, Canada, and Australia due to a technical error in its Falcon product. Users encountered disruptions, including BSOD errors. CrowdStrike is actively working on a fix.
Microsoft/Crowdstrike outage ground planes, banks and the London Stock Exchange
A cybersecurity program update failure caused global disruptions affecting businesses and services like United Airlines, McDonald’s, and the London Stock Exchange. Microsoft and CrowdStrike faced issues, but the problem was resolved without a cyberattack. CrowdStrike's shares dropped 20%, and Microsoft's fell 2.9%. The incident, involving Windows and security software, is one of the largest IT outages, surpassing past disruptions.
62 Minutes could bring your business down
CrowdStrike, a leading cybersecurity company, excels in evaluations like MITRE Engenuity ATT&CK and The Forrester Wave™. Their Falcon platform offers cloud security, identity protection, and advanced threat detection. Notable clients praise their modern security stack. CrowdStrike emphasizes fast threat detection and promotes Generative AI analyst, Charlotte. They warn about the 62-minute average for network breaches, urging businesses to prioritize security. Aiming for comprehensive protection, they offer a free trial.
Global IT Collapse Puts Cyber Firm CrowdStrike in Spotlight
A faulty patch from CrowdStrike Holdings Inc. caused a global IT collapse, impacting various sectors. CrowdStrike's shares dropped by 15%, losing $8 billion. The incident emphasized the importance of endpoint protection software.
2024 CrowdStrike incident: The largest IT outage in history
A faulty update by CrowdStrike led to a global computer outage affecting airlines, banks, hospitals, and government services. Over 3,200 flights were canceled, emphasizing the need for strong cybersecurity.
Devs: Ugh...why?
Security: For safety!
Devs: Fine, we won't argue. Deploy it if you may.
A few moments later...
Devs: All of our VM's are slow as crap! Defender is using 100% of the CPU!
Security: Add another core to your VM's. ticket closed
Management: Why are our developers up 30% on their cloud spend!?
The disconnect is that companies are both (1) the only entity in control of their system and how it is tested and (2) not liable if a security breach does happen.
I believe we need to enable red teams (security researchers) to test the security of any system, with or without permission, so long as they report responsibly and avoid obviously destructive behavior such as sustained DDoS attacks.
A branch of the government, possibly of the military (the Space Force?) could constantly be trying to hack the most important systems in our nation (individuals and private companies too). The bad guys are doing this anyway, but hopefully the good guys could find the security holes first and report them responsibly.
Again, currently this doesn't happen because it would be embarrassing and inconvenient for powerful companies. We threaten researchers who do nothing more than press F12 (view HTML source) with jail time and then have our best surprised Pikachu faces ready for when half the nations data is stolen every week or major systems go down. Actually, we don't make faces at all, half the nation's data is stolen every week--no, actually we don't even take notice, we just accept it as the way things have to be. Because, after all, we can't expect companies to be liable, but we can trust companies to have exclusive control over the testing of their security. How convenient for them.
sentinelone, tanium, guardicore, defender endpoint, delina
all running as root (or worse), sucking up absurd amounts of resources, often more than the software running on the machine (but advertised as "LOW IMPACT")
they also cause reliable software to break due to bugs in e.g. their EBPF
also often serialises all network and disk on the machine through to one single thread (so much for multi-queue NVMe/NICs)
the risk and compliance attitude that results in this corporate mandated malware being required needs to go
this software creates more risk than it prevents
Making systems hard to hack and robust to rare events:
* is really hard,
* costs a lot of money, and
* reduces earnings in the short term.
Faced with these inconvenient facts, many executives who want to see stock prices go up prioritize... other things.
Am I bitter at losing the business decisions that push ease of management by sending control to service providers? Not really. It's been dozens of times, and I lose every time.
I can raise the concerns to make sure the decisions are educated ones, and then let the decisions be made.
Take ZScaler, which is a service that proxies all network connections of a computer to a central cloud proxy server, mitms it (decrypt, inspect, log, and encrypt), and then forwards it to the target server. Imagine that this is hacked, and this isn't immediately discovered. Hackers listening in and being able to tap off cookies, bearer tokens and other confidential information for weeks. That would affect so many companies. And if they would want to cause a DoS, many computers and servers would be left without an operational internet connection.
Is it just me?
As I say every time this happens (and it will keep happening for the next decade or so)... Ambient Authority systems can't be secured, we need to switch to Operating Systems designed around Capability Based Security.
We need at least 2 of them, from competing projects.
I do not invest in cybersecurity companies, it is very risky IMO
https://webcache.googleusercontent.com/search?q=cache:https:...
https://cc.bingj.com/cache.aspx?d=464600016483&w=i7yXBm7Gwof...
Right now, pretty much everyone is looking to outsource their "security" to a single vendor, disregarding the fact that security is not a product, but a process.
That... won't change! And incumbents will get less-awful about their impact on "protected" systems.
And yet, there's an opportunity here! Do you truly understand Windows? And whatever happens on that platform? And how to monitor that activity for adverse actions? Without taking down your customers on a regular/observable basis?
Step right up! There are a lot of incumbents facing imminent replacement...
Related
Cybersecurity platform Crowdstrike down worldwide, users logged out of systems
CrowdStrike, a cybersecurity platform, faced a global outage affecting users in countries like India, Japan, Canada, and Australia due to a technical error in its Falcon product. Users encountered disruptions, including BSOD errors. CrowdStrike is actively working on a fix.
Microsoft/Crowdstrike outage ground planes, banks and the London Stock Exchange
A cybersecurity program update failure caused global disruptions affecting businesses and services like United Airlines, McDonald’s, and the London Stock Exchange. Microsoft and CrowdStrike faced issues, but the problem was resolved without a cyberattack. CrowdStrike's shares dropped 20%, and Microsoft's fell 2.9%. The incident, involving Windows and security software, is one of the largest IT outages, surpassing past disruptions.
62 Minutes could bring your business down
CrowdStrike, a leading cybersecurity company, excels in evaluations like MITRE Engenuity ATT&CK and The Forrester Wave™. Their Falcon platform offers cloud security, identity protection, and advanced threat detection. Notable clients praise their modern security stack. CrowdStrike emphasizes fast threat detection and promotes Generative AI analyst, Charlotte. They warn about the 62-minute average for network breaches, urging businesses to prioritize security. Aiming for comprehensive protection, they offer a free trial.
Global IT Collapse Puts Cyber Firm CrowdStrike in Spotlight
A faulty patch from CrowdStrike Holdings Inc. caused a global IT collapse, impacting various sectors. CrowdStrike's shares dropped by 15%, losing $8 billion. The incident emphasized the importance of endpoint protection software.
2024 CrowdStrike incident: The largest IT outage in history
A faulty update by CrowdStrike led to a global computer outage affecting airlines, banks, hospitals, and government services. Over 3,200 flights were canceled, emphasizing the need for strong cybersecurity.