A defective CrowdStrike kernel driver sent computers around the globe into a reboot death spiral, taking down air travel, hospitals, banks, and more with it. Here’s how that’s possible.
"CrowdStrike is far from the only security firm to trigger Windows crashes with a driver update. Updates to Kaspersky and even Windows’ own built-in antivirus software Windows Defender have caused similar Blue Screen of Death crashes in years past."
"'People may now demand changes in this operating model,' says Jake Williams, vice president of research and development at the cybersecurity consultancy Hunter Strategy. 'For better or worse, CrowdStrike has just shown why pushing updates without IT intervention is unsustainable.'"
Agreed, this seems like a pretty obvious failed smoke test.
Three options seem likely to me: the build was untested, the final package got corrupted after testing, the test environment has some kind of abberant config that hid the defect.
Kernel drivers are "reviewed" and signed by Microsoft for exactly this reason. It's a security risk if any program an administrator runs could load malicious kernel drivers into windows
Something I have heard (take with a grain of salt) is that there was a new windows update that went out just before the crowdstrike update. And the issue happened with the new windows update.
I’m sure they have their own solution for that, but yes, it would be unwise for a government to install software maintained by a foreign country. Kind of like voting booths.
Kaspersky has caused BSODs because of updates in the past as well. Hardly an AV maker hasn't. The problem here is that Crowd Strike has captured the enterprise market in a large portion of the globe.
Oh I'm well aware. I hated deploying Kaspersky. But we switched to Crowdstrike last year and now this happened. Just a funny coincidence.
Luckily, we're a small company and a third use Macs. The others, well, I had three PC laptop and one virtual server issues. Not too bad. We're on the West Coast so glad I was aware of it last night when Australia got issues.
Two quick points, given the massive impact of this eveny it is clear to say many critical systems run windows. Meaning them being windows doesn't make them any less "actual computers".
Also, the OS in this event is irrelevant. They could have botched an update to their Linux version and crashes all the Linux boxes leaving windows untouched. This was not a result of an issue of any OS but a bad update.
They are less of an actual computers in a sense that they are not running stuff under their owner / operator control. This would happen in Linux with much lower chances, because there are no side update channels to such a critical component of the system used there.
However, to take back what I just wrote :) - I am sure rightly motivated engineers would be able to build such a security hole into Linux too, under enough pressure from bad corporate decisions.