July 19th, 2024

It's not just CrowdStrike – the cyber sector is vulnerable

A faulty update from CrowdStrike's Falcon Sensor caused a global outage, impacting various industries. Stock market reacted negatively. Incident raises concerns about cybersecurity reliance, industry concentration, and the need for resilient tech infrastructure.

Read original articleLink Icon
It's not just CrowdStrike – the cyber sector is vulnerable

A faulty content update from CrowdStrike's Falcon Sensor product caused a global outage affecting businesses worldwide, including airlines, banks, and broadcasters. The incident highlights concerns about quality control and reliance on third-party cybersecurity providers. The stock market reacted with CrowdStrike's shares opening down 9.5%. The incident may lead to a reevaluation of outsourcing critical functions and an increase in internal IT teams. Concentration risk in the cybersecurity industry is also a concern, with a few companies dominating the market. The incident underscores the need for diversification and redundancy in systems to prevent such widespread failures in the future. Clients, governments, and regulators are urged to consider building more resilient tech infrastructure. The cyber sector's vulnerability extends beyond CrowdStrike, prompting a broader discussion on cybersecurity practices and risk management.

Related

Cybersecurity platform Crowdstrike down worldwide, users logged out of systems

Cybersecurity platform Crowdstrike down worldwide, users logged out of systems

CrowdStrike, a cybersecurity platform, faced a global outage affecting users in countries like India, Japan, Canada, and Australia due to a technical error in its Falcon product. Users encountered disruptions, including BSOD errors. CrowdStrike is actively working on a fix.

Microsoft/Crowdstrike outage ground planes, banks and the London Stock Exchange

Microsoft/Crowdstrike outage ground planes, banks and the London Stock Exchange

A cybersecurity program update failure caused global disruptions affecting businesses and services like United Airlines, McDonald’s, and the London Stock Exchange. Microsoft and CrowdStrike faced issues, but the problem was resolved without a cyberattack. CrowdStrike's shares dropped 20%, and Microsoft's fell 2.9%. The incident, involving Windows and security software, is one of the largest IT outages, surpassing past disruptions.

62 Minutes could bring your business down

62 Minutes could bring your business down

CrowdStrike, a leading cybersecurity company, excels in evaluations like MITRE Engenuity ATT&CK and The Forrester Wave™. Their Falcon platform offers cloud security, identity protection, and advanced threat detection. Notable clients praise their modern security stack. CrowdStrike emphasizes fast threat detection and promotes Generative AI analyst, Charlotte. They warn about the 62-minute average for network breaches, urging businesses to prioritize security. Aiming for comprehensive protection, they offer a free trial.

Global IT Collapse Puts Cyber Firm CrowdStrike in Spotlight

Global IT Collapse Puts Cyber Firm CrowdStrike in Spotlight

A faulty patch from CrowdStrike Holdings Inc. caused a global IT collapse, impacting various sectors. CrowdStrike's shares dropped by 15%, losing $8 billion. The incident emphasized the importance of endpoint protection software.

2024 CrowdStrike incident: The largest IT outage in history

2024 CrowdStrike incident: The largest IT outage in history

A faulty update by CrowdStrike led to a global computer outage affecting airlines, banks, hospitals, and government services. Over 3,200 flights were canceled, emphasizing the need for strong cybersecurity.

Link Icon 23 comments
By @bluedino - 3 months
Security: You must install Microsoft Defender on all Linux VM's

Devs: Ugh...why?

Security: For safety!

Devs: Fine, we won't argue. Deploy it if you may.

A few moments later...

Devs: All of our VM's are slow as crap! Defender is using 100% of the CPU!

Security: Add another core to your VM's. ticket closed

Management: Why are our developers up 30% on their cloud spend!?

By @Buttons840 - 3 months
Cyber Security is a matter of national security, but currently we sacrifice our national security for the convenience of companies.

The disconnect is that companies are both (1) the only entity in control of their system and how it is tested and (2) not liable if a security breach does happen.

I believe we need to enable red teams (security researchers) to test the security of any system, with or without permission, so long as they report responsibly and avoid obviously destructive behavior such as sustained DDoS attacks.

A branch of the government, possibly of the military (the Space Force?) could constantly be trying to hack the most important systems in our nation (individuals and private companies too). The bad guys are doing this anyway, but hopefully the good guys could find the security holes first and report them responsibly.

Again, currently this doesn't happen because it would be embarrassing and inconvenient for powerful companies. We threaten researchers who do nothing more than press F12 (view HTML source) with jail time and then have our best surprised Pikachu faces ready for when half the nations data is stolen every week or major systems go down. Actually, we don't make faces at all, half the nation's data is stolen every week--no, actually we don't even take notice, we just accept it as the way things have to be. Because, after all, we can't expect companies to be liable, but we can trust companies to have exclusive control over the testing of their security. How convenient for them.

By @blibble - 3 months
they're correct, all the others are similarly shit

sentinelone, tanium, guardicore, defender endpoint, delina

all running as root (or worse), sucking up absurd amounts of resources, often more than the software running on the machine (but advertised as "LOW IMPACT")

they also cause reliable software to break due to bugs in e.g. their EBPF

also often serialises all network and disk on the machine through to one single thread (so much for multi-queue NVMe/NICs)

the risk and compliance attitude that results in this corporate mandated malware being required needs to go

this software creates more risk than it prevents

By @cs702 - 3 months
For most corporations, security and robustness are -- and for a long time have been -- an afterthought.

Making systems hard to hack and robust to rare events:

* is really hard,

* costs a lot of money, and

* reduces earnings in the short term.

Faced with these inconvenient facts, many executives who want to see stock prices go up prioritize... other things.

By @lukev - 3 months
It's rapidly getting to the point where the cure is worse than the disease, when it comes to this kind of product.
By @Damogran6 - 3 months
It's almost as if we're seeing the downsides to our cloud based decisions. Uncontrolled costs, lack of visibility, placing control of critical processes in the hands of other groups...that also have control of critical processes globally.

Am I bitter at losing the business decisions that push ease of management by sending control to service providers? Not really. It's been dozens of times, and I lose every time.

I can raise the concerns to make sure the decisions are educated ones, and then let the decisions be made.

By @udev4096 - 3 months
By @guru4consulting - 3 months
For a business that relies on SaaS applications over cloud and uses dumb machines (windows, iPad, whatever) as client terminals, can someone please explain what are the actual threat factors that these EDR tools like Crowdstrike Falcon address? And if SaaS applications can restrict access, detect anomalies with user behavior, have MFA for auth, etc.. will that mitigate these risks? I guess common issues like key loggers, malwares, virus attacks have much simpler solutions than a complex EDR which seems to need root access!! Someone, please educate.
By @freitzkriesler2 - 3 months
Cyber was a 90s buzz word that died out and became vogue when cyber security became cool. I cringe every time I hear it drop.
By @ramesh31 - 3 months
I remember being proud of the fact that I had an intimate knowledge and understanding of every single process running on my dev machine. Things felt sane. I could fully comprehend what was happening on my system at all times. Then the button pusher configurator class got called a new name, "DevOps" and started pushing all this crap on us. I'm ready to just start doing work on a private machine at this point.
By @mrkramer - 3 months
Don't do automatic updates....roll updates manually. That would be a nice thing for the beginning.
By @sebazzz - 3 months
Centralisation is really the core of the problem here.

Take ZScaler, which is a service that proxies all network connections of a computer to a central cloud proxy server, mitms it (decrypt, inspect, log, and encrypt), and then forwards it to the target server. Imagine that this is hacked, and this isn't immediately discovered. Hackers listening in and being able to tap off cookies, bearer tokens and other confidential information for weeks. That would affect so many companies. And if they would want to cause a DoS, many computers and servers would be left without an operational internet connection.

By @ehPReth - 3 months
I've been trialling application allowlisting, but wow is it ever frustrating. So much stuff isn't signed, and when it is the accompanying DLLs aren't. or the signature is invalid. or some of Windows' own executables/dlls aren't signed (why?? you make applocker??) or the installer is, but none of the actual resultant end files

Is it just me?

By @mikewarot - 3 months
We build our "cyber fortress" out of the Turing Complete analog of Crates of C4... and wonder why things go wrong all the time.

As I say every time this happens (and it will keep happening for the next decade or so)... Ambient Authority systems can't be secured, we need to switch to Operating Systems designed around Capability Based Security.

We need at least 2 of them, from competing projects.

By @monero-xmr - 3 months
The real financial problem is that cybersecurity is mostly box checking. It's an industry that is open to commoditization, as startups in lower-cost global regions manage to check the box as well as the next-most-expensive region, and cost conscious companies keep migrating. But the power of the box checking is strong.

I do not invest in cybersecurity companies, it is very risky IMO

By @craxdevil7 - 3 months
thats true, it is disheartening when security controls are only seen as a checklist to comply with some framework, and not actually implemented. https://medium.com/@confusedcyberwarrior/what-is-soc2-how-to... This gives a false sense of security, which is further bad for cyber space. Crowdstrike incident on other hand shows that how we still have single points of failure on our supposedly secure and safe systems. https://medium.com/@confusedcyberwarrior/when-security-becom...
By @1vuio0pswjnm7 - 3 months
By @1vuio0pswjnm7 - 3 months
By @UweSchmidt - 3 months
So how do you actually cybersecure a company in a compliant and practical way?
By @hcfman - 3 months
Probably get a lot more of this when the full force of the cyber resilience act kicks in.
By @exabrial - 3 months
Honestly until we can get rid of the perception that SOC2/Sables-Oxly/HiTrust provides any meaningful security we’re stuck.
By @PreInternet01 - 3 months
The "cyber sector" is... awful? Nah... irresponsible? Nah... immature? Yeah, probably!

Right now, pretty much everyone is looking to outsource their "security" to a single vendor, disregarding the fact that security is not a product, but a process.

That... won't change! And incumbents will get less-awful about their impact on "protected" systems.

And yet, there's an opportunity here! Do you truly understand Windows? And whatever happens on that platform? And how to monitor that activity for adverse actions? Without taking down your customers on a regular/observable basis?

Step right up! There are a lot of incumbents facing imminent replacement...