Cybersecurity firm Crowdstrike pushed an update that caused millions of Windows computers to enter recovery mode, triggering the blue screen of death. Learn …

    • General_Shenanigans@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 months ago

      This happened because a file that CrowdStrike pushed out, which by their own processes is not one that is signed, was immediately pushed out with one of their updates. This update was pushed directly through CrowdStrike’s own method, not via Windows Update. CrowdStrike maintains this capability in order to quickly respond to and prevent security threats. The fact that they have .sys files that aren’t signed is crazy on its own, and a huge screwup by CrowdStrike. So many companies relied upon and trusted this company because up until now, everybody considered it a great product, so it was extremely popular and prevalent. It’s been a huge wake up call for everybody in I.T.

      • MetaCubed@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        2 months ago

        I’m not sure if you intended to reply to me, but I am aware of this. Thanks for checking my understanding though :)

    • werefreeatlast@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      I don’t hear about billions of Linux or Mac computers going down all at the same time. I’m hearing that windows allows a simple text file change to bring down all of them at the same time.

        • werefreeatlast@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          2 months ago

          Even if you write assembly code straight out like a total hacker, it’s still a text file. Literally jump 0x12345 is text. And if it’s just a few kilobits long, then it’s a simple text file yes. Got anything else to ad? Specially if the file actually doesn’t work and the system made to run it “windows” is such shit that every copy of it got halted.

    • Treczoks@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      In a way, it was. If Windows was not as crappy as it is, external solutions would not be needed.

      • stephen01king@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        Linux machines also require Crowdstrike because of business requirements. That does mean Linux is just as crap as Windows then?

          • stephen01king@lemmy.zip
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 months ago

            Probably the latter. Though, I’m not familiar enough with cybersecurity to make a comment on that.

          • MetaCubed@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 months ago

            Not to jump at you in another comment thread, but any OS that is deployed in a business environment should have some form of endpoint protection installed unless it is fully airgapped + isolated.

            Despite the myth that “Linux doesn’t get malware”, it absolutely does and should have protection installed. Even if the OS itself was immune to infection, any possible update can introduce a vulnerability to that.

            Additionally, again, even if the OS (or kernel in the case of linux) couldn’t be infected or attacked, the packages or services installed can be attacked, infected, or otherwise messed with and should be protected.