Logo

    SN 984: CrowdStruck - Crowdstrike, Cellebrite, More Entrust

    enJuly 23, 2024
    What caused the CrowdStrike IT outage affecting millions?
    How did the CrowdStrike incident impact Windows machines?
    What was the severity rating of Cisco's authentication vulnerability?
    What is the importance of proper testing before software updates?
    What role does Big ID play in data security management?

    • CrowdStrike memory pointer mistakeA simple memory pointer mistake in a CrowdStrike agent caused an unprecedented IT outage affecting 8.5 million Windows machines, leading to significant costs for manual repairs.

      Last week saw a major security incident involving CrowdStrike, which caused an unprecedented IT outage affecting 8.5 million Windows machines. Steve Gibson, our security expert, breaks down the details of this incident, explaining that a simple memory pointer mistake in a CrowdStrike agent led to the issue. This mistake caused the agent to attempt to load data from non-existent memory, leading to a crash that Windows couldn't recover from. The only solution was to visit each affected machine and fix the issue manually, resulting in significant costs. While this incident dominated the headlines, other important news emerged, including the FBI's reported break-in into a smartphone belonging to a deceased would-be assassin of Trump, and Cisco's discovery of a serious remote authentication vulnerability with a maximum CVSS 10.0 severity rating. Additionally, Google announced that cookies would not be washed away as previously anticipated, and Steve shared some interesting anecdotes from his weekly podcast mailings.

    • Android phone unlockingFBI can unlock Android phones with help from companies like Celebrate, but iPhones running certain versions of iOS remain a challenge for these phone hacking companies

      Password-protected Android phones can be unlocked by the FBI using assistance from companies like Celebrate, but iPhones running certain versions of iOS remain a challenge for these phone hacking companies. Recently, the FBI encountered an issue unlocking a Samsung Android phone belonging to a would-be assassin, leading them to seek help from Celebrate. Within hours, Celebrate provided the FBI with the necessary software to unlock the phone and gain access to the shooter's social media, browsing history, and other data. However, documents leaked from Celebrate indicate that they cannot unlock iPhones running iOS 17.4 and later, making it difficult for law enforcement to access critical information from these devices. The documents also suggest that most iPhones running iOS 17.1 to 17.3.1 are not yet unlockable, but the company is working on a solution. The Verge reported that phone hacking companies are overstating their capabilities, and it remains to be seen if they will be able to keep up with the constant evolution of phone security. In a separate incident, Cisco disclosed a maximum security vulnerability in their Smart Software Manager on-premises devices, allowing remote unauthenticated users to change passwords at will. This underscores the importance of keeping software up to date and the potential risks associated with on-premises management systems.

    • Entrust's partnership with SSL.comEntrust, a CA with past trust issues, partners with SSL.com to issue certificates under SSL.com's trust, allowing Entrust to retain customer relationships and potentially regain CA community trust, while SSL.com benefits from Entrust's customer base.

      Entrust, a certificate authority (CA) whose certificates were no longer trusted by Google due to past misissuances, is working to regain trust by partnering with SSL.com to issue certificates under SSL.com's auspices. Entrust's certificates issued before October 31, 2024, will continue to be trusted, but new ones will come from SSL.com. This arrangement allows Entrust to retain customer relationships and potentially regain the trust of the CA browser community. The deal is a win-win for both parties, but it feels like a temporary solution for Entrust as they work to improve their operations and rehabilitate their image. Additionally, Entrust is using Things Canary, a modern honeypot solution, to detect and alert on unauthorized access to their network.

    • Canary tool for network securityCanary is a security tool that simulates honeypot devices to detect unauthorized network access, offering profiles, monitoring, notifications, and a money-back guarantee. It's effective against insider threats and network intrusions.

      Canary is a security tool that helps organizations detect unauthorized access to their networks by simulating deceptive honeypot devices. Users can choose a profile, register for monitoring and notifications, and wait for attackers to reveal themselves. Canary offers various pricing plans, including a two-month money-back guarantee. Cookies, once intended for maintaining session state, have been abused for tracking and profiling users across the web. Google's attempt to eliminate third-party cookies and introduce privacy-preserving alternatives has faced resistance, leading to the continuation of third-party cookies in Chrome. Canary is an effective solution for identifying insider threats and other network intrusions, offering peace of mind for businesses looking to strengthen their security posture.

    • Impact of defaults on user experience and privacyDefault settings significantly influence user experience and privacy online. While third-party cookies can impact privacy, first-party cookies are necessary for website functionality. EU regulations have contributed to the misconception that all cookies are bad, but understanding their nuances is crucial.

      Defaults matter and can significantly impact user experience and privacy online. Apple's Safari browser has a default setting that allows third-party cookies, which many users unknowingly turn off due to privacy concerns. However, first-party cookies are necessary for website functionality. The EU's cookie regulations have contributed to the belief that all cookies are bad, but that's not the case. Google, which relies heavily on third-party cookies for its business, has implemented an API that requires their use. The discussion also touched on email delivery issues, including false positives from antivirus software and invisible text that triggered spam filters. Overall, it's essential to be aware of the impact of defaults and the importance of understanding the nuances of privacy and security online.

    • Cloud data warehouse architectureSnowflake's architecture allows for multiple virtual warehouses within one system, but security considerations are crucial when building a cloud data warehouse. External resource updates can pose a security risk, and balancing convenience and security is important.

      Building a data warehouse in the cloud requires careful consideration, as each unique use case may require specific resources. This principle is reflected in Snowflake's architecture, which allows for multiple virtual warehouses within one system. Additionally, the importance of security was highlighted through an anonymous listener's experience with CDK's dealership outage, which led to the need for manual intervention and updating interface credentials. The use of resource hashes, while convenient, can pose a security risk if external resources are updated without notice. Ultimately, a balance must be struck between convenience and security. Lastly, a discussion about a potential denial-of-service attack using a Linux daemon to block incoming connections raised the importance of considering the potential downsides of active blocking, such as the possibility of creating a denial-of-service condition if an attacker spoofs their source IP address.

    • IT disaster preventionProper testing and preparation are essential to prevent large-scale IT disasters. Prioritize testing, use pilot groups, and consider trickle-down updates to minimize impact and ensure prompt issue resolution.

      Proper testing and preparation are crucial in preventing large-scale IT disasters. The CrowdStrike event, which caused widespread outages and affected thousands of workstations and servers, highlights the importance of having procedures and policies in place to mitigate risks. Many listeners shared their experiences of long recovery times and the devastating impact on their organizations. Some suggested that CrowdStrike, as a continually updated software, should have prioritized testing and pilot groups before rolling out updates to all users. Others proposed the use of trickle-down updates and automated reporting to identify and address issues promptly. Overall, the incident underscores the need for a well-thought-out and proactive approach to IT management.

    • Enterprise security software outagesEnterprise security software, like CrowdStrike Falcon, can lead to major IT outages affecting critical infrastructure and services, causing significant disruptions and potential financial losses, due to their essential but prone-to-crashing nature inside the operating system kernel.

      The widespread use of enterprise security software, in this case CrowdStrike Falcon, can lead to major IT outages affecting critical infrastructure and services in various sectors such as transportation, finance, healthcare, and government. The faulty update caused millions of Windows systems to crash with a blue screen of death, leading to significant disruptions and potential financial losses. The recovery process was lengthy and required manual intervention on each affected system. Similar incidents have occurred with other security vendors in the past. While some argue that security software can be a cause of such outages, it's important to note that they are not unique or new, and most impact only a subset of users. The nature of security software, which needs to run inside the operating system kernel, makes it essential but also prone to causing system crashes.

    • CrowdStrike outageA faulty update to CrowdStrike's Falcon EDR software caused a global outage, affecting many Fortune 500 companies and government departments, potentially leading to political debates over security vendors' access to the Windows kernel

      CrowdStrike, a leading cybersecurity company, experienced a major outage caused by a faulty update to its Falcon endpoint detection and response (EDR) software. The update, intended to protect against new malware techniques, instead triggered a logic error that caused Windows systems to crash with a BSOD. The error spread globally as the update was delivered to CrowdStrike's vast customer base, including many Fortune 500 companies and government departments. The incident has significant implications beyond the technical details and global outages, potentially leading to political repercussions and debates over security vendors' access to the Windows kernel. Microsoft, which holds a dominant market position in the OS market, could be under pressure to kick security vendors out of the kernel, but this move could have negative consequences for system visibility and security. CrowdStrike, founded in 2011, is a cybersecurity giant with over 29,000 corporate customers and has been instrumental in detecting and uncovering major malware campaigns. The company's Falcon software, which runs on millions of computers worldwide, provides crucial visibility into cyber threats. Despite the recent outage, CrowdStrike's role in protecting against cyber threats remains vital.

    • CrowdStrike software vulnerabilityAdvanced cybersecurity companies can still experience software vulnerabilities leading to system crashes, even with behavioral protection mechanisms in place. Proper testing and validation are crucial to prevent such incidents.

      Even the most advanced cybersecurity companies like CrowdStrike can experience software vulnerabilities leading to system crashes. In this case, an update to a configuration file caused a logic error, resulting in a blue screen of death (BSOD) on Windows systems. The file in question, named "Primer," was part of CrowdStrike's behavioral protection mechanisms and controlled how Falcon evaluated named pipe execution on Windows systems. The update aimed to target newly observed malicious named pipes used in cyber attacks but instead caused a system crash due to a logic error. Big ID, a data security posture management solution, can help organizations manage and reduce data risks, including uncovering dark data and automating data retention. It seamlessly integrates with existing tech stacks and provides advanced AI models to reduce risk and accelerate time to insight. The US Army and other major enterprises have adopted Big ID for its powerful capabilities.

    • Boot start driver vulnerabilityA flawed boot start driver can cause widespread crashes and compromise operating system integrity, highlighting the importance of secure software development and ongoing updates.

      A recent IT incident caused approximately 8.5 million Windows-based machines to crash due to a flaw in CrowdStrike's boot start driver. This driver, designed to enhance Windows' anti-malware defenses, instead caused a blue screen of death error by attempting to load a non-existent memory location. The root cause analysis is ongoing, but it appears that a named pipe API was involved. Microsoft's own documentation identifies a boot start driver as a critical driver required for Windows to start, and in this case, CrowdStrike's driver was given this designation. The competition between good and bad actors to establish the first foothold in an operating system was highlighted, as the entity that arrives first can protect itself from subsequent events. The incident underscores the importance of operating system integrity and the potential consequences of a flawed boot start driver. The investigation is ongoing, with updates to be provided as more information becomes available.

    • CrowdStrike software issueDespite advanced security measures, undetected software issue led to a massive global issue for CrowdStrike. The cause is unclear, but theories suggest unexpected failure paths or distribution issues. Thorough testing is crucial to prevent such incidents.

      Despite CrowdStrike's advanced security measures, a significant software issue went undetected and led to a massive global issue. The cause of this issue is still unclear, with theories suggesting it could be due to unexpected failure paths or distribution issues. CrowdStrike's silence on the matter has raised concerns, leading some to speculate about potential repercussions and the possibility of insufficient testing. The industry as a whole is working to reverse engineer the issue and determine the root cause, but it's unlikely that CrowdStrike will provide a detailed explanation. Microsoft's past experience with a similar, albeit less catastrophic, event highlights the potential for unlikely failures in even the most robust systems. Additionally, the distribution of unsigned files and potential vulnerabilities in interpreters are potential contributing factors. Regardless of the cause, the incident underscores the importance of thorough testing and the potential risks of running code in Ring Zero.

    • Non-existent memory exceptionsNon-existent memory exceptions can lead to serious issues like crashes or system reboots, especially for third-party drivers. The root cause can be unclear, ranging from incompetence to cyber attacks. End users should exercise caution with antivirus software and consider Microsoft's hardware abstraction layer for safer communication with hardware.

      An exception occurs when attempting to read from non-existent memory, which can potentially lead to serious issues such as crashes or even system reboots into a different operating system copy. This can be particularly problematic for third-party drivers running at a low level, as seen in the recent Microsoft Windows incident. While some suggested disabling problematic drivers on boot, this may not be a feasible solution for all cases. The root cause of the issue remains unclear, with speculation ranging from incompetence to cyber attacks. End users should exercise caution when running antivirus software due to its necessary low-level permissions, which can potentially create vulnerabilities. Microsoft's hardware abstraction layer is designed to mitigate these risks by allowing communication with hardware at a safer level. Ultimately, the importance of understanding and addressing these issues lies in their potential impact on both individuals and organizations, as well as the broader implications for the future of technology.

    Was this summary helpful?

    Recent Episodes from Security Now (Audio)

    SN 992: Password Manager Injection Attacks - Aging Media, Naval Starlink, adam:ONE

    SN 992: Password Manager Injection Attacks - Aging Media, Naval Starlink, adam:ONE
    • Windows Endpoint Security Ecosystem Summit
    • Aging storage media does NOT last forever
    • How Navy chiefs conspired to get themselves illegal warship Wi-Fi
    • adam:ONE named the #1 best Secure Access Service Edge (SASE) solution
    • AI Talk
    • Password Manager Injection Attacks

    Show Notes - https://www.grc.com/sn/SN-992-Notes.pdf

    Hosts: Steve Gibson and Mikah Sargent

    Download or subscribe to this show at https://twit.tv/shows/security-now.

    Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

    You can submit a question to Security Now at the GRC Feedback Page.

    For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.

    Sponsors:

    SN 991: RAMBO - Cloned YubiKeys, Telegram vs. Signal, French Elevators, Unix Time

    SN 991: RAMBO - Cloned YubiKeys, Telegram vs. Signal, French Elevators, Unix Time
    • Offer to uninstall Recall was a bug, not a feature
    • YubiKeys can be cloned
    • Miscellany
    • Is WhatsApp secure?
    • Telegram vs Signal
    • French elevators
    • Freezing your credit
    • The Quiet Canine
    • Unix time
    • Bobiverse book 5
    • Exodus: The Achemedes Engine
    • Watching SpinRite
    • RAMBO

    Show Notes - https://www.grc.com/sn/SN-991-Notes.pdf

    Hosts: Steve Gibson and Mikah Sargent

    Download or subscribe to this show at https://twit.tv/shows/security-now.

    Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

    You can submit a question to Security Now at the GRC Feedback Page.

    For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.

    Sponsors:

    SN 990: Is Telegram an Encrypted App? - CrowdStrike Exodus, DDoS-as-a-Service, 'Active Listening' Ad Tech?

    SN 990: Is Telegram an Encrypted App? - CrowdStrike Exodus, DDoS-as-a-Service, 'Active Listening' Ad Tech?
    • Telegram puts End-to-End Privacy in the Crosshairs
    • Free security logging is good for everyone
    • CrowdStrike hemorrhaging customers
    • Microsoft to meet privately with EDR (Endpoint Detection & Response) vendors
    • Yelp's Unhappy with Google
    • Telegram as the hotbed for DDoSass – DDoS as a Service
    • Chrome grows more difficult to exploit
    • Cox Media Group's "Active Listening" has apparently not ended
    • Cascading Bloom Filter follow-up
    • Closing the Loop
    • Is Telegram an encrypted app?

    Show Notes - https://www.grc.com/sn/SN-990-Notes.pdf

    Hosts: Steve Gibson and Leo Laporte

    Download or subscribe to this show at https://twit.tv/shows/security-now.

    Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

    You can submit a question to Security Now at the GRC Feedback Page.

    For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.

    Sponsors:

    SN 989: Cascading Bloom Filters - Key Card Backdoors, Fake Cisco Gear

    SN 989: Cascading Bloom Filters - Key Card Backdoors, Fake Cisco Gear
    • CrowdStrike Exec's "Most Epic Fail" Award
    • Hardware backdoors discovered in Chinese-made key cards
    • Counterfeit CISCO networking gear
    • SpinRite
    • Errata
    • NPD breach updates from listeners
    • Looking back at old SN episodes
    • Cascading Bloom Filters

    Show Notes - https://www.grc.com/sn/SN-989-Notes.pdf

    Hosts: Steve Gibson and Leo Laporte

    Download or subscribe to this show at https://twit.tv/shows/security-now.

    Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

    You can submit a question to Security Now at the GRC Feedback Page.

    For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.

    Sponsors:

    SN 988: National Public Data - Big Patch Tuesday, The Biggest Data Breach

    SN 988: National Public Data - Big Patch Tuesday, The Biggest Data Breach
    • Revocation Update
    • GRC's next experiment
    • Patch Tuesday
    • "The Famous Computer Café"
    • IsBootSecure
    • GRC Email
    • Working through WiFi Firewalls
    • Transferring DNS
    • OCSP attestation vs. TLS expiration
    • Platform key expiration
    • National Public Data

    Show Notes - https://www.grc.com/sn/SN-988-Notes.pdf

    Hosts: Steve Gibson and Leo Laporte

    Download or subscribe to this show at https://twit.tv/shows/security-now.

    Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

    You can submit a question to Security Now at the GRC Feedback Page.

    For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.

    Sponsors:

    SN 987: Rethinking Revocation - SinkClose, IsBootSecure, Another Bad RCE

    SN 987: Rethinking Revocation - SinkClose, IsBootSecure, Another Bad RCE
    • Sitting Ducks DNS attack
    • A Bad RCE in another Microsoft server
    • SinkClose
    • The CLFS.SYS BSoD
    • IsBootSecure
    • Rethinking Revocation

    Show Notes - https://www.grc.com/sn/SN-987-Notes.pdf

    Hosts: Steve Gibson and Leo Laporte

    Download or subscribe to this show at https://twit.tv/shows/security-now.

    Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

    You can submit a question to Security Now at the GRC Feedback Page.

    For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.

    Sponsors:

    SN 986: How Revoking! - Crowdstrike Damage, Firefox Cookies

    SN 986: How Revoking! - Crowdstrike Damage, Firefox Cookies
    • Platform Key Disclosure
    • Firefox's 3rd-party Cookie mess
    • The W3C Finally Weighs-in
    • CrowdStrike Damages.
    • GRC's Email
    • How Revoking!

    Show Notes - https://www.grc.com/sn/SN-986-Notes.pdf

    Hosts: Steve Gibson and Leo Laporte

    Download or subscribe to this show at https://twit.tv/shows/security-now.

    Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

    You can submit a question to Security Now at the GRC Feedback Page.

    For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.

    Sponsors:

    SN 985: Platform Key Disclosure - Crowdstrike Post-mortem, Entrust Update

    SN 985: Platform Key Disclosure - Crowdstrike Post-mortem, Entrust Update
    • Crowdstrike post-mortem
    • PiDP-11
    • What Crowdstrike is fixing
    • Marcus Hutchins on who is to blame
    • Entrust's Updated Info
    • 3rd-Party Cookie Surprise
    • Security training firm mistakenly hires a North Korean attacker
    • Google and 3rd party cookies
    • Google's influence
    • The auto industry and data brokers
    • DNS Benchmark on Mac
    • Platform Key Disclosure

    Show Notes - https://www.grc.com/sn/SN-985-Notes.pdf

    Hosts: Steve Gibson and Leo Laporte

    Download or subscribe to this show at https://twit.tv/shows/security-now.

    Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

    You can submit a question to Security Now at the GRC Feedback Page.

    For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.

    Sponsors:

    SN 984: CrowdStruck - Crowdstrike, Cellebrite, More Entrust

    SN 984: CrowdStruck - Crowdstrike, Cellebrite, More Entrust
    • Cellebrite unlocks Trump's would-be assassin's phone.
    • Cisco reported on a CVSS of 10.0
    • Entrust drops the other shoe
    • Google gives up on removing 3rd-party cookies
    • Miscellany
    • Snowflake and data warehouse applications
    • CDK auto dealership outage
    • Polyfill.io and resource hashes
    • MITM
    • Blocking Copilot
    • Blocking incoming connections via IP
    • CrowdStruck

    Show Notes - https://www.grc.com/sn/SN-984-Notes.pdf

    Hosts: Steve Gibson and Leo Laporte

    Download or subscribe to this show at https://twit.tv/shows/security-now.

    Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

    You can submit a question to Security Now at the GRC Feedback Page.

    For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.

    Sponsors:

    SN 983: A Snowflake's Chance - CDN Safety, Microsoft's Behavior, CDK Ransomware Attack

    SN 983: A Snowflake's Chance - CDN Safety, Microsoft's Behavior, CDK Ransomware Attack
    • Using Content Delivery Networks Safely
    • The CDK Global Ransomware Attack
    • The IRS and Entrust
    • Polyfill.io fallout
    • Microsoft's Behavior
    • A Snowflake's Chance

    Show Notes - https://www.grc.com/sn/SN-983-Notes.pdf

    Hosts: Steve Gibson and Leo Laporte

    Download or subscribe to this show at https://twit.tv/shows/security-now.

    Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

    You can submit a question to Security Now at the GRC Feedback Page.

    For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.

    Sponsors:

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io