CrowdStrike effectively bricked windows, Mac and Linux today.

Windows machines won’t boot, and Mac and Linux work is abandoned because all their users are on twitter making memes.

Incredible work.

          • rockSlayer@lemmy.world
            link
            fedilink
            arrow-up
            10
            arrow-down
            1
            ·
            2 months ago

            What if that someone is another toddler that found the gun in the street, and it got in the street because it fell off a truck? Your Honor, what if the toddler had murderous intent because they were denied a sucker?

          • jedibob5@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            arrow-down
            3
            ·
            2 months ago

            Is this implying that a publicly-traded corporation whose software is installed on millions of computers around the world has the same level of agency and responsibility as a preschooler?

            I mean, yes, Microsoft bears responsibility for blindly accepting whatever deployment package CrowdStrike gave it and immediately yeeting it out to 100% of customers via Windows Update without any kind of validation or incremental rollout, and should probably be sued for it. That still doesn’t negate the complete and catastrophic failures at every step of the development process on the part of CrowdStrike. It takes a lot of people to fuck up this bad.

              • peopleproblems@lemmy.world
                link
                fedilink
                arrow-up
                2
                ·
                2 months ago

                That’s the impressive part of all this. Microsoft didn’t do it. CloudStrike did it.

                Microsoft left something in a state that allowed CloudStrike to fuck up enough to brick systems.

                It’s why we spend a lot of time reviewing security analysis of our own software - if there’s a way to fuck everything up, it better not because we enabled it to get fucked.

            • Justin@lemmy.jlh.name
              link
              fedilink
              English
              arrow-up
              3
              ·
              2 months ago

              Is this implying that a publicly-traded corporation whose software is installed on millions of computers around the world has the same level of agency and responsibility as a preschooler?

              When it comes to IT reliability and security, kinda, yeah.

              Windows AV and MDM is a bit of a horror show in the corporate space. I worked somewhere where developers weren’t allowed to use WSL because it was blocked by McAfee. We also had 3 different MDMs running and they were slow as balls even though they were modern 8 core laptops.

    • cheesepotatoes@lemmy.world
      link
      fedilink
      arrow-up
      49
      ·
      2 months ago

      Good lord I would hope critical surgical computers like that aren’t networked externally… Somehow I’m guessing I’m wrong.

      • FlowerTree@pawb.social
        link
        fedilink
        arrow-up
        4
        ·
        2 months ago

        Critical surgery computers may also be running under Windows LTSC, so they might not get the CrowdStrike patch. Maybe…

      • Gestrid@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        I’d heard some hospitals were affected. They cancelled appointments and non-critical surgeries.

        I’m guessing it was mostly their “behind the desk” computers that got affected, not the computers used to control the important stuff. The computers in patients’ rooms may have been affected as well, but (at least in the US) those are usually just used to record information about medicine given and other details about the patient, nothing critical that can’t be done manually.

      • Dran@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        2 months ago

        I’ve heard anecdotally that some 911 services were down in my area, but I can’t speak to how wide that was.

    • half coffee@lemy.lol
      link
      fedilink
      arrow-up
      7
      ·
      2 months ago

      Anecdotal, but my spouse was in surgery during the outage and it went fine, so I imagine they take precautions (like probably having a test machine for updates before they install anything on the real one, maybe)

      • Blank@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        2 months ago

        There were no test rings for this one and it wasn’t a user controlled update. It was pushed by CS in a way that couldn’t be intercepted/tested/vetted by the consumer unless your device either doesn’t have CS installed or isn’t on an external network… or I suppose you could block CS connections at the firewall. 🤷‍♂️

      • Zacryon@feddit.org
        link
        fedilink
        arrow-up
        1
        ·
        2 months ago

        Depending on the machine, I guess it’s likely that those aren’t using Windoofs at all. I would be surprised if there were devices in use during surgery who run on that.

    • tiredofsametab@kbin.run
      link
      fedilink
      arrow-up
      1
      ·
      2 months ago

      Good News! Unless something has changed since I worked in healthcare IT, those systems are far too old to be impacted!

      I’m half-joking. I don’t know what that kind of equipment runs, but I would guess something embedded. The nuke-med stuff was mostly linux and various lab analyzers were also something embedded though they interface with all sorts of things (which can very well be windows). Pharmaceutical dispensers ran various linux-like OS’s (though I couldn’t even tell you the names anymore). Some medical records stuff was also proprietary, but Windows was replacing most of it near the end of my time.

      One place we had ran their keycard system all on a windows 3.1 box still. I don’t doubt some modern systems also are running on Windows which has interesting implications for getting into/out of places.

      That said, a lot of that stuff doesn’t touch the outside internet at all unless someone has done something horribly wrong. Medical records systems often do, though (including for billing and insurance stuff).

  • Klanky@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    28
    ·
    2 months ago

    I wish my Windows work machine wouldn’t boot. Everything worked fine for us. :-(

    • Affidavit@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      2 months ago

      Could be worse. I was the only member of my entire team who didn’t get stuck in a boot loop, meaning I had to do their work as well as my own… Can’t even blame being on Linux as my work computer is Windows 11, I got ‘lucky’; I just got a couple of BSODs and the system restarted just fine.

      • Rivalarrival@lemmy.today
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 months ago

        Funny, mine did a couple BSODs then restarted just fine, at first. Then a fist shaped hole appeared in the monitor and it wouldn’t turn on again.

        Weird bug.

  • db2@lemmy.world
    link
    fedilink
    arrow-up
    25
    arrow-down
    8
    ·
    2 months ago

    They make software for both of them also though, IMO they’re at fault for sure but so should be Microsoft for making a trash operating system.

    • sylver_dragon@lemmy.world
      link
      fedilink
      English
      arrow-up
      29
      ·
      2 months ago

      Not saying Windows isn’t trash, but considering what CrowdStrike’s software is, they could have bricked Mac or Linux just as hard. The CrowdStrike agent has pretty broad access to modify and block execution of system files. Nuke a few of the wrong files, and any OS is going to grind to a halt.

      • Djtecha@lemm.ee
        link
        fedilink
        arrow-up
        8
        ·
        2 months ago

        Probably would have been worse if this was on Linux. That’s like 90% of the internet.

        • Ooops@feddit.org
          link
          fedilink
          arrow-up
          3
          ·
          2 months ago

          Good thing is the kind of people making decisions based on buzzword-bongo filled PR campaigns like Crowdstrike’s are already forcing their IT to use Windows anyway.

          • Djtecha@lemm.ee
            link
            fedilink
            arrow-up
            1
            ·
            2 months ago

            It was a serious ask to install it from auditors that don’t know what the fuck they are doing. On all ec2 machines for “reasons” I’m sure there are companies out there pushed into doing this because they don’t have people willing to die on those hills.

        • db2@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          2 months ago

          I’m sure the three people that use Linux and Crowdstrike together would have been very upset. 🤣

      • peopleproblems@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        2 months ago

        That’s… Not great. I didn’t actually think about what all these wild AV systems could do, but that’s incredibly broad access.

        Maybe I’m just old, but it always strikes me as odd that you’d spend so much money on that much intrusive power that on a good day slows your machines down and on a bad day this happens.

        I get that Users are stupid. But maybe you shouldn’t let users install anything. And maybe your machines shouldn’t have access to things that can give them malware. Some times, you don’t need everything connected to a network.

    • Montagge@lemmy.zip
      link
      fedilink
      arrow-up
      15
      arrow-down
      1
      ·
      2 months ago

      I’d say the issue isn’t that Windows is a trash OS, but everyone using the exact same trash OS and same trash security program.

      • TrickDacy@lemmy.world
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        2 months ago

        Except not make an OS so shitty and vulnerable that it needs millions of hours and billions of dollars pumped into keeping it from being hacked in a split second. But yes nothing besides that one minor thing.

        • Revan343@lemmy.ca
          link
          fedilink
          arrow-up
          1
          arrow-down
          1
          ·
          2 months ago

          Companies use the same software on Linux and Mac systems, and it’s a kernel module there as well; this could have happened to any OS that companies are using it on, it just happened to happen on Windows.

          Giving kernel access to outside software is always a risk; these companies chose to take that risk

          • TrickDacy@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            2 months ago

            They make plastic pocket protectors too but that doesn’t mean we need to use them. Sounds you missed my point

  • thecodeboss@lemmy.world
    link
    fedilink
    arrow-up
    9
    ·
    2 months ago

    What’s the criteria for a Windows machine to be affected? I use Windows but haven’t had any issues today.

  • PrettyFlyForAFatGuy@feddit.uk
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    2 months ago

    As a career QA, i just do not understand how this got through? Do they not use their own software? Do they not have a UAT program?

    Heads will roll for this

    • HyperMegaNet@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      2 months ago

      From what I’ve read, it sounds like the update file that was causing the problems was entirely filled with zeros; the patched file was the same size but had data in it.

      My entirely speculative theory is that the update file that they intended to deploy was okay (and possibly passed internal testing), but when it was being deployed to customers there was some error which caused the file to be written incorrectly (or somehow a blank dummy file was used). Meaning the original update could have been through testing but wasn’t what actually ended up being deployed to customers.

      I also assume that it’s very difficult for them to conduct UAT given that a core part of their protection comes from being able to fix possible security issues before they are exploited. If they did extensive UAT prior to deploying updates, it would both slow down the speed with which they can fix possible issues (and therefore allow more time for malicious actors to exploit them), but also provide time for malicious parties to update their attacks in response to the upcoming changes, which may become public knowledge when they are released for UAT.

      There’s also just an issue of scale; they apparently regularly release several updates like this per day, so I’m not sure how UAT testing could even be conducted at that pace. Granted I’ve only ever personally involved with UAT for applications that had quarterly (major) updates, so there might be ways to get it done several times a day that I’m not aware of.

      None of that is to take away from the fact that this was an enormous cock up, and that whatever processes they have in place are clearly not sufficient. I completely agree that whatever they do for testing these updates has failed in a monumental way. My work was relatively unaffected by this, but I imagine there are lots of angry customers who are rightly demanding answers for how exactly this happened, and how they intend to avoid something like this happening again.

  • danc4498@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 months ago

    Is there a good eli5 on what crowdstrike is, why it is so massively used, why it seems to be so heavily associated with Microsoft and what the hell happened?

    • Baggie@lemmy.zip
      link
      fedilink
      arrow-up
      4
      ·
      2 months ago

      Gonna try my best here:

      Crowdstrike is an anti-virus program that everyone in the corporate world uses for their windows machines. They released a update that made the program fail badly enough that windows crashes. When it crashes like this, it tries to restart in case it fixes the issue, but here it doesn’t, and computers get stuck in a loop of restarting.

      Because anti-virus programs are there to prevent bad things from happening, you can’t just automatically disable the program when it crashes. This means a lot of computers cannot start properly, which means you also cannot tell the computers to fix the problem remotely like you usually would.

      The end result is a bunch of low level techs are spending their weekends manually going to each computer individually, and swapping out the bad update file so the computer can boot. It’s a massive failure on crowdstrikes part, and a good reason you shouldn’t outsource all your IT like people have been doing.

      • themeatbridge@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        2 months ago

        It’s also a strong indicator that companies are not doing enough to protect their own infrastructure. Production servers shouldn’t have third party software that auto-updates without going through a test environment. It’s one thing to push emergency updates if there is a timely concern or vulnerability, but routine maintenance should go through testing before being promoted to prod.

    • Captain Aggravated@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      Crowdstrike is a cybersecurity company that makes security software for Windows. It apparently operates at the kernel-level, so it’s running in the critical path of the OS. So if their software crashes, it takes Windows down with it.

      This is very popular software. Many large entities including fortune 500 companies, transport authorities, hospitals etc. use this software.

      They pushed a bad update which caused their software to crash, which took Windows down with it on an extremely large number of machines worldwide.

      Hilariously bad.

                • Dashi@lemmy.world
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  2 months ago

                  If there is any software you want running at kernel though it is your AV. Not saying Spotify has a reason for running at kernel though… But running AV at kernel in theory is a better way to protect the machine and you.

                • rottingleaf@lemmy.world
                  link
                  fedilink
                  arrow-up
                  0
                  ·
                  edit-2
                  2 months ago

                  Third parties love their trojans just being treated as normal way of life.

                  “Anti-cheats” instead of not being imbeciles while designing protocols for multiplayer, “anti-viruses” which need to run kernel-level and download databases with executable code, video drivers which just can’t be packaged with Windows.

                  One thing I’ve realized is that large parts of social structure are dependent on cheating. We all want to cheat, so we all agree to a system where cheating is possible, but pretend it’s not happening until someone gets caught and then just behave as if nothing happened.

                  One necessary part of someone’s upbringing is honesty. There’s an amazingly deep moment in LOTR where Eomer says that Rohirrim don’t lie, so they are not easily deceived.

                  This is not a poetic device. This is how it works. Ponzi schemes usually target people who think they are smarter and more cunning and will gain something from them. And rigged security systems work because most of participants think they are the ones who may at some point abuse those systems, but most of them are the ones becoming eventually victims of such abuse.

  • Lucidlethargy@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    2 months ago

    Lol, they only bricked specific machines running their product. Everyone else was fine.

    This was a business problem, not a user problem.

  • gencha@lemm.ee
    link
    fedilink
    arrow-up
    4
    arrow-down
    4
    ·
    2 months ago

    CrowdStrike effectively bricked windows, Mac and Linux today.

  • hsdkfr734r@feddit.nl
    link
    fedilink
    arrow-up
    9
    arrow-down
    14
    ·
    edit-2
    2 months ago

    Can an OS be bricked?:

    A brick (or bricked device) is a mobile device, game console, router, computer or other electronic device that is no longer functional due to corrupted firmware, a hardware problem, or other damage.[1] The term analogizes the device to a brick’s modern technological usefulness.[2]

    Edit: you may click the tiny down arrow if you think it can’t. ;)

    • n4utix@lemm.ee
      link
      fedilink
      arrow-up
      18
      ·
      2 months ago

      🤓

      It’s just a setup to the punchline, not a legitimate assessment of the situation.

      • hsdkfr734r@feddit.nl
        link
        fedilink
        arrow-up
        3
        arrow-down
        2
        ·
        2 months ago

        :) the hardware is still more capable than a brick:
        Plug in favourite installation media stick, push reset button (if there is one), reinstall.

        • macniel@feddit.org
          link
          fedilink
          arrow-up
          4
          arrow-down
          4
          ·
          2 months ago

          and the one I was replying to was asking about an OS being bricked, not about the bios or firmware.

          AND even then you can reflash the bios, its time consuming and costly but you can.

          • Ooops@feddit.org
            link
            fedilink
            arrow-up
            3
            ·
            2 months ago

            Yes, time consuming. But it’s still working hardware, not a now useless, now unrepairable paper weight…

            Which is the definiton of “bricked” although people nowadays start to use the term inflationary.

          • Phuntis@lemm.ee
            link
            fedilink
            English
            arrow-up
            2
            ·
            2 months ago

            it’s not costly or time consuming maybe in the past but now you plug in a memory stick and hit a button then wait 5 minutes for a light to stop flashing

          • Saik0@lemmy.saik0.com
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            2
            ·
            2 months ago

            AND even then you can reflash the bios, its time consuming and costly but you can.

            then nothing can be bricked because on paper you can desolder the rom chip and put another one in place.

            If you want to be stupidly pedantic about shit, then nothing is anything.

            • anton@lemmy.blahaj.zone
              link
              fedilink
              arrow-up
              1
              ·
              2 months ago

              I agree with the sentiment but …

              then nothing can be bricked because on paper you can desolder the rom chip and put another one in place.

              Companies already put serial numbers in components and configure them so only specific ones work together, requiring OEM tools to pair them.
              It’s imaginable that someone makes something similar with e-fuzes instead.

              • Saik0@lemmy.saik0.com
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                3
                ·
                2 months ago

                Nah. The person you responded to asked a facetious question. You started being pedantic.Everyone know what it means when someone says something is bricked.