No video

The Crowdstrike Falcon Apocalypse - Here's how my night went

  Рет қаралды 34,181

2GuysTek

2GuysTek

Күн бұрын

Пікірлер: 359
@2GuysTek
@2GuysTek Ай бұрын
For all the armchair quarterbacks out there who are interested in how Crowdstrike came to make such a disastrous mistake, they’ve released a preliminary post-incident report. It’s worth the read: www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/
@dosmaiz7361
@dosmaiz7361 Ай бұрын
RIP to all IT people dealing with bitlockered systems.
@2GuysTek
@2GuysTek Ай бұрын
@@dosmaiz7361 Best have those recovery keys handy!
@xerr0n
@xerr0n Ай бұрын
yeah, took bitlocker down globally until i could get a handle on that better, after a better active backup system and multi key storage im ready to get it back up again. i work on a tiny place though so its not too bad
@JimAllen-Persona
@JimAllen-Persona Ай бұрын
@@2GuysTekOur help desk was swamped with calls for their bitlocker keys. Took me 30 min to get past it on my workstation. I was in early yesterday and waiting for the help desk instructions. I’m an infrastructure DBA. Fortunately for us our European people had been working on it and since we’re primarily a Linux shop… we lost a few DC’s on our dedicated LAN’s.
@slomotrainwreck
@slomotrainwreck Ай бұрын
@@2GuysTek I'm sorry, I have to say this.😆 "Oh! No problem! The BitLocker recovery keys are on a Post It stuck to the bottom of my keyboard"... 🤣🤣🤣
@S3ndIt13
@S3ndIt13 Ай бұрын
@2GuysTek yeah, they're on an offsite system that is also experiencing this issue. 😂🫠
@colin2utube
@colin2utube Ай бұрын
As a retired IT worker who went through Y2K and is still irritated by all those who said all the work we put in to prevent this sort of outcome was a waste of time and resources, I feel pained for those doing the firefighting, hopeful they get the recognition they deserve, but suspect they'll be in part scape goated for not having (unaffordable) automated backup and recovery systems in place.
@kirishima638
@kirishima638 Ай бұрын
Yes this annoys me too. I hear people saying Y2K was a scam, that nothing happened etc. Yes, because we worked hard to prevent it! The people who anticipate and mitigate potential issues such that they never happen NEVER get any credit.
@Paul_Wetor
@Paul_Wetor Ай бұрын
The alarm had to be sounded so that action was taken. And because action was taken, nothing happened. Which made the problem seem to be much ado about nothing. Prevention happens out of public view. (The old Harry Chapin song "The Rock" is a perfect example).
@muhdiversity7409
@muhdiversity7409 Ай бұрын
So glad I was put in a position where I decided that retirement was better than dealing with more of this crap. I spoke to a former colleague and he said everything is down. This is a company with over 300K employees and the vast majority do not have physical machines because they are all accessed via VDI in massive data centers. Never has being retired felt so good. I hope they had a good strategy for all those bitlocker keys. lmao. I used to work with a guy who was forever causing production issues. Because things always failed in his code he was the one invariably fixing the bugs of his making. Unlike y2k this guy was seen as a hero because he was always saving the day. Humans are stupid. Seriously. Especially the management kind.
@kirishima638
@kirishima638 Ай бұрын
@@muhdiversity7409 this is like people who are lauded for making the most commits on gitlab, when in reality they are fixing hundreds of mistakes. Good developers make fewer commits, not more.
@mrlawilliamsukwarmachine4904
@mrlawilliamsukwarmachine4904 Ай бұрын
Maybe this was the Great Reset and we’re in 2000 now. 😝
@JustWatchMeDoThis
@JustWatchMeDoThis Ай бұрын
And suddenly, we went from no cash to a paper sign that says cash only.
@2GuysTek
@2GuysTek Ай бұрын
I love this statement. There was a moment, during the *WTF IS GOING ON?!* stage of this whole thing, that it felt like things were going all Mr. Robot reeeal fast.
@todd.mitchell
@todd.mitchell Ай бұрын
Brilliant observation
@realfingertrouble
@realfingertrouble Ай бұрын
That actually happened in shops here,. ATMs were out and the merchant systems were borked. Cash. We really need to keep cash around.
@peppigue
@peppigue Ай бұрын
​@@realfingertroubletwo or more vertically disjunct payment infrastructures would suffice. not trivial, but we're talking essential infrastructure here. analog backup infrastructure will be much more expensive to set up
@msmithsr01
@msmithsr01 Ай бұрын
I have to admit, this took me back to my IT days 20 years ago and i literally had chills up and down my back. My heart goes out to all the key boards warriors who had to go through what they've gone through and those who are still plugging away. There's got to be a better way and of course that's the same thing we said 20 years ago...
@johnp312
@johnp312 Ай бұрын
Working for a company that's still recovering from a cyberattack (we switched to CrowdStrike in the wake of that), this was the worst nightmare I could wake up to.
@lampkinmedia
@lampkinmedia Ай бұрын
I appreciate you guys and gals. I work for a small IT company out of Alaska. We were not affected thankfully but I can't imagine the mass scale of this outage and the tedious manual work that will have to be implemented in order to get all systems back up. I'm in the sales dept. I bring in new clients for the company I work for. I've always had respect for Tech. I'm somewhat of a nerd/ sales guru. and appreciate the work behind the scenes that keeps systems running smooth and safe.
@MicroAdventuresCA
@MicroAdventuresCA Ай бұрын
We weren’t affected, but in the end it’s just dumb luck that we chose a different EDR product. Lots of lessons learned today, and I’m sure there are going to be a lot of great discussions in the coming weeks. Sleep well! You deserve it.
@quantumangel
@quantumangel Ай бұрын
Just use Linux. Seriously, it's way better and doesn't have this kind of cr*p.
@ichangednametoamorecringyo1489
@ichangednametoamorecringyo1489 Ай бұрын
​@@quantumangel bro this isn't a Linux > Windows issue.
@J-wm4ss
@J-wm4ss Ай бұрын
​@@quantumangelcrowd strike broke Linux machines a while back lol
@quantumangel
@quantumangel Ай бұрын
@@ichangednametoamorecringyo1489 No this is a "windows is so bad it broke critical infrastructure" issue. It's a "windows is s terrible os" issue. It's a anything > windows issue.
@quantumangel
@quantumangel Ай бұрын
@@J-wm4ss ​ and yet it didn't disrupt half the world like windows did; even though *most servers run Linux.*
@Cysecsg
@Cysecsg Ай бұрын
Every organisation’s IT teams find solace in each other demise thinking they are not alone to face this sh!t lol
@druxpack8531
@druxpack8531 Ай бұрын
right there with you...worked from 3:30AM to 8:00PM, with another long day tomorrow....
@2GuysTek
@2GuysTek Ай бұрын
Stay strong, sleep well!
@simonmasters3295
@simonmasters3295 Ай бұрын
Give it up! You worked hard for one day, you didn't have a clue what was happening and you were stressed. And you have the same tomorrow... ...welcome to our world.
@TomNimitz
@TomNimitz Ай бұрын
The first thing I thought about when I heard about the outage was the line "Skynet IS the virus".
@noahz
@noahz Ай бұрын
Happy to learn that I'm not the only one who thought of Lawnmower Man 🤓
@Craig-ml8nw
@Craig-ml8nw Ай бұрын
My night/day started at 11:41 PM central time. Finished at 7:30PM tonight
@2GuysTek
@2GuysTek Ай бұрын
@@Craig-ml8nw you earned your rest!
@Vdiago
@Vdiago Ай бұрын
Lets move everything to the cloud!!! Great idea! 😂😂😂
@cbdougla
@cbdougla Ай бұрын
It's not just the cloud. It was just about every Windows server running Crowdstrike including local, physical machines.
@mrman991
@mrman991 Ай бұрын
While I agree that using one tool for all things is a bad idea, this isn't that kind of situation. Mistakes and accidents happen, expecting anything to be 100% all the time isn't realistic. How people react and fix the issues is always what matters way way more. "Cloud" has its uses, mostly thats if you want burst or global infratructure, or just have money you want to get rid of. This impacted on-prem just as much as cloud stuff though.
@quantumangel
@quantumangel Ай бұрын
Actually, the cloud runs mostly on Linux, which is why it was largely unaffected.
@Vdiago
@Vdiago Ай бұрын
@@quantumangel i was mainly referring to office 365. Anyway, you are right. There is no fucking cloud. Its only someone's else Linux server.
@keithstarks1433
@keithstarks1433 Ай бұрын
This was like listening to some strange dude describe my Friday.
@freddiecrumb77
@freddiecrumb77 Ай бұрын
We had Azure VM and Microsoft suggested doing a disaster recovery process, which includes changing the region, etc. I was determined to not mess with the VMs because they are set up very specifically to the apps we had - basically I was hoping Microsoft would be willing to fix it, since I didn't do anything to break it. 45 minutes later it came on, I was glad that I waited.
@TraciD512
@TraciD512 Ай бұрын
This is an EXCELLENT RECAP Thank YOU for explaining it for regular folks.
@2GuysTek
@2GuysTek Ай бұрын
So glad you liked it! I appreciate the comment!
@foxale08
@foxale08 Ай бұрын
Something like this was inevitable in a world where enterprises don't control/delay updates and leave it to the vendors.
@2GuysTek
@2GuysTek Ай бұрын
This isn’t the first time I’ve heard this since the incident. I remember back in the day with Symantec Enterprise that we’d have to ‘bless’ the definitions released. But these days that’s just not how EDR/AV works. It’s part of the promise of these next-gen tools is that you benefit from their quick actions in response to events happening in the security space. And yes, that’s exactly how we got here unfortunately.
@Craig-ml8nw
@Craig-ml8nw Ай бұрын
I'm pretty sure this was not in a sensor update. This was something Crowdstrike pushed out to everyone. The bulk of my environment is set for N-2 sensor updates. So theoretically I should have avoided this. That didn't happen we got zapped everywhere except the PCs that were turned off overnight.
@Keith-shaochic
@Keith-shaochic Ай бұрын
When I used to run McAfee EPO back in the day, we had a standard 12 hour delay from new DAT released to the first push to our environment. Saved us once on a bad update deleting system files on servers.
@raydall3734
@raydall3734 Ай бұрын
Yesterday was a big win for CrowdStrike. Finally a virus protection program that disabled the most prolific spyware program on the internet - Microsoft Windows. No Linux/Mac products were harmed.
@2GuysTek
@2GuysTek Ай бұрын
Ba dum tis! 😂🤣
@franknoneofya9585
@franknoneofya9585 Ай бұрын
No didn't happen but could have happened. Crowdstrike has agents for all major OS's. Also if you have any type of reputable people, that push would have never occurred. No matter what company, nothing gets pushed into your environment without thorough testing.
@reaperinsaltbrine5211
@reaperinsaltbrine5211 Ай бұрын
Old adage: "Windows is not a virus: viruses DO work"
@reaperinsaltbrine5211
@reaperinsaltbrine5211 Ай бұрын
Not as if Android or IOS would do any narcing on their users......
@tibbydudeza
@tibbydudeza Ай бұрын
Actually it happened to Linux servers in April as well … did not make the same headlines.
@Reformatt
@Reformatt Ай бұрын
Seeing so many machines down all at the same time was definitely the craziest thing I have ever seen in my 25+ years in IT
@boringNerd
@boringNerd Ай бұрын
Thanks for sharing your experience. I am not working in IT, but I do work in the tech industry. I am lucky my company don't use Crowdstrike, and so far in my country, only the airport and a few airlines were affected. I am not travelling, so I just went about with my day. To everyone involved in fixing this mess, thank you. I try my best to explain to my friends and family what is going on, and I have been emphasizing the situation the sysadmins, IT helpdesk staffs are facing, with the occasional F U to Crowdstrike. Everyone in IT should be appreciated more and I can only hope this can be studied every where and something can be done to prevent the same thing from happening again. Remember it is not just the good guys learning from this outage, I am pretty sure the bad guys, the thread actors are also learning from this.
@shawnadams1965
@shawnadams1965 Ай бұрын
I feel your pain. Symantec Corporate Antivirus did this to me years ago... I had to boot over 100 computers using a USB stick with a fix on it and I was the only IT person in the company at the time. We got rid of it within the next week and switched to Sophos. "Knock on wood" that never happens again.
@robrjones99
@robrjones99 Ай бұрын
It was a rough day for many for sure. I work for a university and it impacted a LOT of our production systems. I agree it's the best on the market. I think there may be some diversification in the platforms companies use after this, but I can't see there being any mass defections. Just my less than 2 cents. I'm tired too and I hope the weekend for everyone get much better. I appreciate your content and have learned a lot.
@GaryL3803
@GaryL3803 Ай бұрын
I understand from reliable sources, IT techs that understand servers, laptops and such, that the reason that only Microsoft systems were affected is that Falcon must communicate with the Microsoft kernel, the lowest level of the Operating System. Corruption in the kernel causes failure of the whole OS and must be restored in safe system mode. Linux and MacOS operation systems do not allow applications to communicate directly and so cannot be corrupted by a wayward application. Only the wayward application will fail on Linux and MacOS and could be easily rolled back to the original application. The Mac OS was rewritten some years ago to a Linux/Unix type architecture. I wonder if there is any kernel protection that will be implemented in the Microsoft OS anytime soon.
@zemm9003
@zemm9003 Ай бұрын
Windows provides awesome backdoors for the NSA/CIA to exploit and I believe this is the reason it was never changed.
@GaryL3803
@GaryL3803 Ай бұрын
@@zemm9003 You neglected to mention the FBI, DIA, DHS and ??? 🙂
@zemm9003
@zemm9003 Ай бұрын
@@GaryL3803 maybe. But I wouldn't know about that and mentioning them would be controversial. Therefore I mentioned only agencies that are well known to have exploited Windows' vulnerabilities in the past.
@Consequator
@Consequator Ай бұрын
If you have VMWare, you could fire up a VM that has PowerCLI, shut down all the windows VM's, then loop through every disk image to mount it on the new VM, delete that file and unmount it again. PROBABLY best to use a Linux VM for this as Linux is far 'nicer' when it comes to mounting and unmounting drives. I'm GUESSING other hypervisors would have similar tools. HyperV shops will probably be an even bigger level of screwed with dataloss due to the hypervisors themselves resetting. Then there's next level screwed if bitlocker is in use.
@DaleCunningham_DBA
@DaleCunningham_DBA Ай бұрын
Got my PROD SQL Servers back online within 6 hours! 300 TB Apocalypse!!!
@jeffolson4731
@jeffolson4731 Ай бұрын
The company I work for was hit hard. To make matters more fun some of our smaller locations, like mine, don’t have any IT personnel. That meant that 2 of us who know computers had to get all of them working once we were given instructions. On my computer I have local admin rights so on that computer I was able boot into safe mode and delete the file. On all other computers we either had to PXE boot or go through the Microsoft menus to get to the command prompt. We still have 3 computers with Bitlocker that we cannot access. No one in the company has the correct access code.
@2GuysTek
@2GuysTek Ай бұрын
We had a few workstations in that same boat as well.
@Banzai431
@Banzai431 Ай бұрын
We worked in to Saturday morning man. It was brutal. When it was first happening I was like you. Immediately thought it was some kind of attack. Then I went online and saw it was happening everywhere. Crowdstrike's valuation is going to be interesting on Monday when trading starts again. There's still a whole bunch of people on remote laptops that are locked out due to Bitlocker. This is going to be such a PITA.
@2GuysTek
@2GuysTek Ай бұрын
100% with ya! Not a great way to start a weekend - I hope you get some sleep!
@usefulprogrammer9880
@usefulprogrammer9880 Ай бұрын
To provide greater clarity, the primary issue here is that cloudstrike falcon runs at kernel level and has internet connected privileged binaries so as to provide rolling updates to threat protection offerings. This was and always has been a massive attack vector that’s yet to have been exploited at a high level. It just so happens to have exposed its vulnerability to the world through incompetence. If Microsoft was half intelligent they’d step in and implement something similar to Apple who provides a system extension abstraction layer so as to not give direct kernel access. They will not do this, because they are stupid arrogant and lazy. Instead, I think most critical organizations should steer clear of crowdstrike and similar kernel level applications with internet dependent binaries. Even if that leaves you slightly more vulnerable to other threats.
@melindagallegan5093
@melindagallegan5093 Ай бұрын
System extension abstraction layer? Is this also a reason why Mac OS is less prone to acquiring viruses?
@zemm9003
@zemm9003 Ай бұрын
It's even worse because now everybody in the world knows that CS has this vulnerability and all hackers will be looking into hacking Crowdstrike because by doing so they can easily access your PC.
@stevemeier7876
@stevemeier7876 Ай бұрын
I work for a large company that use to use crowstrike...we removed and replaced with MS E5 License Security Stuff when we went to e5 as a cost thing ..... But we had 40 machines still affected as even though it was removed we had had instances of crowdstrike re installing itself...real bizarre ...those 2 Servers have been fixed and the other PC's for users will be fixed when Desktop Staff come in Monday as they were at remote sites...what a mess.....
@xerr0n
@xerr0n Ай бұрын
ok, so now i am thinking that crowdstrike really is more malware at this point, i don't like sticky stuff.
@jrr851
@jrr851 Ай бұрын
Id audit your GPO. Might be an old policy kicking around reinstalling Falcon.
@2GuysTek
@2GuysTek Ай бұрын
@@jrr851 This is exactly what I thought too, or SCCM collection.
@jcpflier6703
@jcpflier6703 Ай бұрын
Fantastic video! I loved how you told the story of how it began at your org. That's exactly how I felt. What I suspect is going to come out of this is that CrowdStrike may have to segment its solution updates by industry. This failure was massive and even though they will check it countless times going forward, my guess is that companies will come forward and say that this cannot happen again. Just the fact that they test, test, test, and re-test going forward will not be enough. We saw a lot of side channel attacks coming in the form of phishing. While the event was not malicious, it did have somewhat the same net result and that is unavailability of services. What's also got put out front and center is, all the major companies that use Crowdstrike. I am sure that going forward they will test the hell out of their updates, but segmentation by industry is probably where they will need to go for rolling out global updates so that things like Healthcare or Travel are not impacted at the same time in the event of an issue. This will also place more focus on Microsoft Azure. While it's not Microsoft's fault, we will need to start planning for DR scenarios that we once thought were pie in the sky issues. Now those pie in the sky scenarios are real. Very real.
@2GuysTek
@2GuysTek Ай бұрын
I appreciate it! We also saw a MASSIVE jump in targeted Crowdstrike phishing emails-don't let any good tragedy go to waste, I suppose. I also agree that there needs to be more opt-in for updates, like the update rings for betas of Windows, for example. It's a tough position to be in because, in the event of aggressive malicious attacks, you wanna get your protection ASAP, and that typically means pushing it as soon as you can. But the reach and the fact that Crowdstrike only services businesses (and big ones at that) means that from a supply chain perspective, it's also an incredibly massive risk, as we've now seen first-hand.
@kennethjones8683
@kennethjones8683 Ай бұрын
CrowdStrike should have eaten their own dog food before releasing this to the public. Play stupid games - win stupid prizes...
@RobertFoxL
@RobertFoxL Ай бұрын
OUCH! 😮 All in the name of "Security" . . . Now we see how fragile our systems really are - and how dependent we are in today's technology! 🤐 Now we also know that major events aren't always caused by bad actors!! 😬 Stay Vigilant and Keep Safe !! 😷 #majorincident #dependencies #securityglitch
@OriginalWaltSilva
@OriginalWaltSilva Ай бұрын
Great video and thanks for sharing your "horror story". I'm a retired IT guy, and still very much like to keep an ear to the ground on IT matters. When this event happened, I was hoping someone who was in the weeds in handling this event within their org would post their story so I can hear details. Having been through similar (albeit less widespread impactful) events, I can 100% relate. Still morbidly curious, I guess.
@2GuysTek
@2GuysTek Ай бұрын
You're on the flip side! You get to enjoy it from the pure curiosity perspective!
@jimward204
@jimward204 Ай бұрын
As a non-tech person, I knew it looked bad yesterday when I started looking at flight delays. Hats off to you and all of the other IT folks dealing with this nightmare!
@SkandiaAUS
@SkandiaAUS Ай бұрын
I'm a contractor to a large Australian retailer and I have to say they have their shit together. Had thousands of POS systems back up over the weekend and then the hundreds of the support laptops by mid morning today. Came down to them being easily able to report on the Bitlocker keys, and admin passwords to gain access to the CS folder. I have a new found respect for disaster preparedness and recovery.
@shaunerickson2858
@shaunerickson2858 Ай бұрын
The rather large global company I work for, doesn't use Crowdstrike, so, amazingly, I've been able to sit back at eat popcorn, all while saying "there but for the grace of God go I". I'm so glad I dodged this bullet.
@lak1294
@lak1294 Ай бұрын
Really great boots on the ground, "this is how it went (down)" account. Surreal. Thank you!
@gloryhalleluiah4787
@gloryhalleluiah4787 Ай бұрын
It’s a Nightmare, you wouldn’t want it on your worst enemy…
@SuburbanBBQ
@SuburbanBBQ Ай бұрын
My heart goes out to everyone affected. Way to hang in there, Rich! We were not impacted, but know quite a few shops here in Houston that were.
@2GuysTek
@2GuysTek Ай бұрын
We live in unprecedented times my friend!
@shlomomarkman6374
@shlomomarkman6374 Ай бұрын
I'm an employee at a small company and had this crap on Friday morning. Our IT guy was abroad in vacation and he got the choise between finding the next flight or sending each employee the admin password by private e-mail. He chose to give us the passwords and change them when he comes back.
@2GuysTek
@2GuysTek Ай бұрын
That's a way to do it. Desperate times call for desperate measures I suppose! :-)
@dragraceold2new
@dragraceold2new Ай бұрын
Crowdstrike is a proud world economic forum company. The plan for a global cyber attack isn't to have someone attack you but for the main cyber attack prevention company to actually be the point of failure in replacement of a "global cyber attack"
@lazarusblackwell6988
@lazarusblackwell6988 Ай бұрын
People:" waaah waaah i cant browse memes becaue of this!!" People in hospitals on a death bed:...... - - ........
@JimAllen-Persona
@JimAllen-Persona Ай бұрын
Get some rest. I’m infrastructure, it hit me as well and I had to get my bitlocker key from the help desk. Still spent us the better part of the AM getting our systems back on line, and then dealing with the AD problems via vCenter. I’m keeping a copy of my bitlocker key in my Mac password file.
@MrZhods
@MrZhods Ай бұрын
My question is after working as an update/patching admin why would you push an update on a Thursday/Friday best practices patch Tuesdays for those who know 🤔
@reaperinsaltbrine5211
@reaperinsaltbrine5211 Ай бұрын
The usual answer for that if you followed the reddit comment stream or here would be the usual "because EDR/AV/DLP/whatever" is different and "zero days" etc. My hunch is that they may have realized they had a vuln in their kernel driver and wanted it gone before clients got wind of it. Or they might had a supply chain attack....
@MrZhods
@MrZhods Ай бұрын
@reaperinsaltbrine5211 I assume it was something that would have been catastrophic if it hadn't been addressed immediately before any vulnerability was published but I stand by my no patch Fridays from personal experience
@reaperinsaltbrine5211
@reaperinsaltbrine5211 Ай бұрын
@@MrZhods Agreed. And it is still just a hunch.....
@timwhite264
@timwhite264 Ай бұрын
Great recap of your very real world experiences! Thank you for sharing sir!
@bbay3rs
@bbay3rs Ай бұрын
That sucks, sorry to hear. Im glad I didnt have to deal with it but Ive been through a malware event and know the feeling. Hang in there!
@gold_7944
@gold_7944 Ай бұрын
The ITasS company I work for fielded 140 calls had 4 simultaneous war rooms on of which wrapped up at about 1 am this morning
@sinisterpisces
@sinisterpisces Ай бұрын
Thank you for taking the time to put this together when you're clearly so exhausted. This is exactly the kind of content we need after an event like this, from real professionals who are there. There's too many "lol why didn't they just ..." Reddit Keyboard Commandos running around making me wish I had a way to smack people through my screen. Respect. One thing I still don't understand is how this actually got out of Crowdstrike's development systems (?) and into their production deployment systems. I realize that one of the big benefits of CS is its rapid response nature, I think backed in part by ML (?), but surely there should have been some sort of internal unit test package or an equivalent to catch a killer update before it was pushed? High speed automation with no QC is an invitation to exactly this sort of disaster. Given how many medical/hospital systems were impacted, including in some locations EMS helicopter service, CS will be lucky if they don't get sued for contributing to someone's death or injury.
@pauldunecat
@pauldunecat Ай бұрын
Best vid so far on this topic. We had a long day as well, I got called at 3am my local time, got to take a nap at 5pm.
@2GuysTek
@2GuysTek Ай бұрын
I appreciate it. There are a lot of videos out about this on KZbin, and it’s pretty obvious that many of the people talking about it don’t have the first-hand experience in actually working it. Get some rest, you earned it!
@DawnofFab
@DawnofFab Ай бұрын
Co. I work for still has over 12k users to bring back online. It's been a nightmare going on 48 hrs now
@2GuysTek
@2GuysTek Ай бұрын
I feel for you! Here's hoping for a speedy recovery!
@mrman991
@mrman991 Ай бұрын
Sure was a day for us. Luckily, by the time we got to the office the fix was know. It could have been a hell of a lot worse. Our DCs were good, a few servers went down but came back quickly. Then we trawled through all the desktops over an 8 hour stint. As IT, all we got from the business was praise because we had constant coms and updates running throughout the day and offloaded a bunch of the reporting responsibilities to the team leads rather than getting all users to make lots of noise reporting.
@2GuysTek
@2GuysTek Ай бұрын
We had great support from our leadership as well - course, it wasn't our faults either, which means blaming IT wouldn't have done anyone much good.😂
@dirkfromhein
@dirkfromhein Ай бұрын
The only big question is why are drivers for windows not signed and then validated by the OS before being installed/loaded? That just seems so obvious. You would think there would also be a transaction log for most recently installed “system” stuff and if more than three reboots are triggered it would rollback the install log and quarantine the most recently installed items. That’s how I’ve designed patching systems in the past for mission critical infrastructure software systems. I had no idea this many people still used windows! I’ve not touched windows for 25yrs.
@reaperinsaltbrine5211
@reaperinsaltbrine5211 Ай бұрын
Agreed on the patch and update part. Even though this is not specific to Win, I believe. As for why so many use it...well there is a huge swath os programs that only runs on DOS/Windows. I've seen DOS software still in production that was written over 20 years ago. We still have XP and W7 machines because they are connected to costly equipment whose drivers don't work with anything newer :(. Also most of the consulting and law firm people have tons of excel files so filled with custom macros that switching is pretty much a nonstarter :/ This amount of technological debt will bita us in the bottom sooner, rather than later.
@dirkfromhein
@dirkfromhein Ай бұрын
​@@reaperinsaltbrine5211 Oh I have the same actually - I have two XP machines (not networked) that run the software to control my SAAB and another one to connect to my 350Z. 😆 I'm pretty sure the SAAB software is not going to be updated.
@mathesonstep
@mathesonstep Ай бұрын
I wonder how long this will take to fully recover from, think about all the laptops that will probably have to be shipped back to the office and the kiosks that are hard to gain physical access too
@richt6353
@richt6353 Ай бұрын
Thank You for this EXCELLENT ANALYSIS!
@joelrobert4053
@joelrobert4053 Ай бұрын
Yesterday was like a digital nuclear bomb going off
@jonboy2950
@jonboy2950 Ай бұрын
Not to mention the people with bitlocker and no access to their keys.
@maryjohansson3627
@maryjohansson3627 Ай бұрын
Very clear and concise. Thanks so much for the video explaining what has to happen to delete the file. What a task to have to touch every machine!
@linh8997
@linh8997 Ай бұрын
Lol. I am just a retired low-level PC Tech. When I got out of bed yesterday I heard the words 'bad update' on tv, so I ran in and quickly did an rst r u i on my own desktop. But apparently I was not even affected, anyhow. But the machines at the hospital where I work as a housekeeper are, and they are all bitlockered VMs. And they have a tiny IT Department with inexperienced techs. That Hands-On solution is not too difficult, as long as you can get the key. Should I offer them my services on a per system basis? More fun than cleaning toilets ! 😅 (Ouch. Poor you!! )
@mikedee8876
@mikedee8876 Ай бұрын
I am also retired IT currently cleaning stalls in a nearby dude Ranch.....nothing could drag me away from this cushy, no brain, paid exercise job in paradise....to return to a workplace of pure stress......dont go back, is my suggestion.
@kirishima638
@kirishima638 Ай бұрын
This was the result of Crowdstrike’s incompetence but Microsoft is also to blame for not adequately protecting their OS at the kernel level. No 3rd party software, no matter the source, should be able to root-kit an OS like this, requiring manual deletion of files like it’s the 1990s. This kind of failure is not possible on MacOS for example.
@Bookcity300
@Bookcity300 Ай бұрын
Good job -first person POV. Thanks!
@heliozone
@heliozone Ай бұрын
Automated updates are a time bomb waiting to explode. Good luck, because you will need it!
@jacksonrodrigobraga3942
@jacksonrodrigobraga3942 Ай бұрын
4k VMs, 3,5k notebooks, 4 gallons of coffee, 3 pizzas aaaaaannnddddddd counting........... (oh.. 2 keyboards too, RIP F8 key 😞)
@reaperinsaltbrine5211
@reaperinsaltbrine5211 Ай бұрын
Why don't you use one of them old HP keyboards? Those last for eternity and a day :D
@2GuysTek
@2GuysTek Ай бұрын
I was on a steady diet of Redbull myself! Best of luck and I hope you get some sleep soon!
@edwinrosales6322
@edwinrosales6322 Ай бұрын
Thanks for sharing your experience; hope you can get some sleep!
@jrr851
@jrr851 Ай бұрын
Thanks for this. My MSP uses a competitor for our MDR, but my previous employer wasnt that lucky. Nuts.
@adamcadd
@adamcadd Ай бұрын
years ago, I worked on a supportdesk and watched a whole bank scream to a halt after Symantec was rolled out. As soon as it loaded the first time, it ran a full scan pegging the IO and CPUs making devices unusable for hours, if someone restarted, it started over
@nathangarvey797
@nathangarvey797 Ай бұрын
I was lucky that my org is currently only using crowdstrike for a few non-critical systems. I feel for you, and hope you get some recovery rest It will be interesting to see what lessons the industry (and world in general) take from this.
@Zekrom569
@Zekrom569 Ай бұрын
RIP, in some airports they did go back to giving handwritten boarding passes
@jimmichael3857
@jimmichael3857 Ай бұрын
Thanks for sharing your story. We don’t use CrowdStrike, but I 100% relate to your gut punch moment when you initially thought “this is it.” I’ve had that pit-of-the-stomach feeling upon seeing weird traffic in my own network several times over the last few years (so far we’re unscathed) and it truly sucks. I’m 30 years into my IT career, and the scourge of ransomware has turned what was once a fun job into an almost constant state of dread. IT is now almost 100% defense, and I hate that.
@2GuysTek
@2GuysTek Ай бұрын
This! It's a constant shadow we live under. Mainly because we all know it's a matter of time, regardless of how on-point your cybersecurity game is.
@RolandoAlvarez
@RolandoAlvarez Ай бұрын
makes me realize CS does not use falcon on their own system
@Vfnumbers
@Vfnumbers Ай бұрын
Worked through from 11pm to 10am Was right in the middle of it as all out monitors vms, pc, db, all bsod.
@TITAN2K
@TITAN2K Ай бұрын
Man i feel all your situation loins and 100% feel for you guys. Luckily this time, I Sitting pretty with S1 today.
@tma2001
@tma2001 Ай бұрын
The more I read about it the more insane it becomes - it wasn't a simple bug but literally a driver file of all zeros! How the hell wasn't it hash checked by the client update process before installation and requesting a reboot ? Or how the hell did ClownStrike update push server not also do basic sanity checks before sending it to _every_ customer at the same time ? /facepalm
@mikedee8876
@mikedee8876 Ай бұрын
to an X86 Machine coder....00 is a NoOp......NoOp means no operation, and the hardware processor goes to the next instruction, which would also be a NoOp and so on until it hits code that does something. NoOps are often used in software timers where the processor loops on NoOps for a certain count, such as a millisecond delay to de-bounce a keyboard.......a processor looping on NoOps will do so forever at full speed until the power goes off.......NoOP is built into the hardware, and I assume, still cannot be changed.................not sure if this helps
@tma2001
@tma2001 Ай бұрын
@@mikedee8876 on x86 opcode 0x00 is a ADD instruction, NOP is 0x90. According to CrowdStrike Blog technical update, the .sys file is not a kernel file but a data config file. What little detail they give is not very clear as to the actual logic error that caused the crash (others have mentioned file parsing logic that resulted in a null ptr memory reference from the crash dump log).
@SpookyNeo
@SpookyNeo Ай бұрын
The previous company I worked at was affected by this. I sent them the fix as soon as I read about it, as I think they were not aware of what was going on. I am lucky enough that the company I work for now does not use Crowdstrike...but honestly, this could have happen with any antimalware software. That was the case with Symantec and McAfee few years ago. Crowdstrike is still an awesome product and one of the best (if not THE best) on the market. I hope they recover from this. In my opinion, Microsoft also has some work to do in Windows following to incident to prevent something like this to happen. Windows is no where near the most robust OS...
@mwatson536
@mwatson536 Ай бұрын
Did not have issues at my site since we don't use Falcon, but my son's company did. I did not know that Azure did not have a console that sucks, and I was just toying with looking into it more. Whew, I dodged a bullet there. This reminds me of the MS service pack nightmare, which I did have to pull long days for. Good luck, folks. I hope you all get some sleep soon. Cheers
@petermatthews-ob1dg
@petermatthews-ob1dg Ай бұрын
so one man, on his own, stopped the world, we are doomed!
@cricket5044
@cricket5044 Ай бұрын
Got that phone call from the shop about blue screens. Can't remote in. Hopped in the car and off to the shop. Just like so many in IT that day.
@2GuysTek
@2GuysTek Ай бұрын
You're in good company!
@silverravn
@silverravn Ай бұрын
thanks for the detailed explanation
@stevengill1736
@stevengill1736 Ай бұрын
Wow, you got a front row seat....to me the fact that this was even possible indicates how fragile things are. What do you think we can do to prevent such a catastrophe in the future?
@ChriaraCass
@ChriaraCass Ай бұрын
Really relate to your story. I’m in Australia so it hit our IT team at Friday 3pm and I’m in development (not ops) and my surface crashed, then my colleagues did. Reported it to my boss then walked away while it rebooted. In the bathroom a woman from a totally different company sharing the building with us tells me “all our pcs crashed so we’re leaving for early drinks at the pub 😂”. I was so relieved! If I’d seen the SQL servers drop first before my laptop that wouldn’t have been a fun moment to live in at all.
@LaziestTechinCyberSec
@LaziestTechinCyberSec Ай бұрын
So I wonder what happens to the executive who chose Crowdstrike in each company? And more generally, how do you actually select an EDR/EPP/XDR?
@markbeck2236
@markbeck2236 Ай бұрын
Sorry that you got affected. Sounds like a hell of a thing.
@sauerkrause_yep
@sauerkrause_yep Ай бұрын
Great video on this topic. I especially appreciate the explanation of what it felt like to be in that unfolding "oh shit, this is it" moment. Absolutely wild day. Thanks for sharing, as a popcorn-enjoyer, this was a great way to bookend a day of catestropic tech news. Pour one out for the homies traveling today
@kodtech
@kodtech Ай бұрын
How can they upload a blank file [0...0]? Why CRC does not detected the anomaly? Why Win Kernel allow blank files to be load? Why MS allow 3th party "base file" to be updated?...This was JUST a TEST! 😉
@tibbydudeza
@tibbydudeza Ай бұрын
They Crowdstrike loaded binary blob full of nulls and then they jump to it to execute … shitty software design As a kernel level driver to are allowed to do anything because you are running at priviledge level
@pandukawb
@pandukawb Ай бұрын
We should have a movie about this
@2GuysTek
@2GuysTek Ай бұрын
Who's playing the lead role? 🤣
@TitanicTarn1912
@TitanicTarn1912 Ай бұрын
My Vic-20 and Radio Shack Tandy computers never had these issues
@reaperinsaltbrine5211
@reaperinsaltbrine5211 Ай бұрын
They also weren't constantly connected to a global network....
@JustWatchMeDoThis
@JustWatchMeDoThis Ай бұрын
I do wonder why huge companies are not diversified more. It is crazy that this can happen all over the world and shut so much down. Even Crowdstrike should be fully diversified I would think where under no circumstances everything goes out to all streams on the same day. I am not IT so I don't know the terminology, but I think you know what I mean. Even in this case it seems redundancy would not have helped because it was a single bad file that went to every computer. But if out of 5000 computers, they had 5 different services or versions of a service where that are getting a different set of downloads on each stream in a single day, this would have only shut down a fifth of them, leaving only a fifth of them disabled for a bit and 80% still operational and able to find the problem before the world comes to a halt. I feel like this incident has opened floodgates and we can and likely will see malciousness on this scale or worse sooner than later. What are your thoughts?
@2GuysTek
@2GuysTek Ай бұрын
You're right to question their approach. At a minimum, you'd have expected a phased approach to pushing patches, but clearly, that's not how CS was operating. A bigger question for me is how did this get past QA? This patch took down almost 100% of all of the clients who received it, with the exception of older Windows 7/Server 2008 R2. With a failure rate that high, it should have gotten caught immediately, and the fact it wasn't suggested more about how they test and validate than anything. Someone in another comment also mentioned they were surprised that CS doesn't break down update deployments based on industry, which is a good idea. Maybe businesses in critical sectors, like hospitals, don't get cutting-edge update releases the instant they're available?
@RJARRRPCGP
@RJARRRPCGP Ай бұрын
2:43 was the CrowdStrike driver? That stop code otherwise, usually means loss of RAM stability, such as badly-seated RAM, or dirty RAM slots.
@Juhsentuh
@Juhsentuh Ай бұрын
I’m an IT System Analyst, crazy how much we rely on computers. Yesterday was insane. By the way in healthcare.. FUN
@Seandotcom
@Seandotcom Ай бұрын
I just spent an hour (50 min on hold, they are SLAMMED) on the phone with my IT guy to get the bitlocker key for my workstation. I told him he’s fighting the good fight and to get some sleep.
@SkaterJay789
@SkaterJay789 Ай бұрын
Man this is my NIGHTMARE, we dodged this being on S1 instead but the description of figuring it out. Nightmare fuel
@Quizidomo
@Quizidomo Ай бұрын
Did the Azure storage outage cause Crowdstrike processes to download a null file stub meaning the mass BSOD outage was triggered by Microsoft but caused by Crowdstrike not parsing input files safely?
@2GuysTek
@2GuysTek Ай бұрын
They were unrelated.
@Quizidomo
@Quizidomo Ай бұрын
@@2GuysTek Who said though?
@joelrobert4053
@joelrobert4053 Ай бұрын
I’m a cybersecurity analyst and my company was on high alert yesterday as we assumed initially this was a cyberattack
@2GuysTek
@2GuysTek Ай бұрын
Maaan, for a while we all were! I was about to call together our IRT!
@Craig-ml8nw
@Craig-ml8nw Ай бұрын
This put a big target on CrowdStrike now, it it wasn't big enough before
@markusdiersbock4573
@markusdiersbock4573 Ай бұрын
Really, the World-Wide Fail wasn't caused by the bad update. The FAIL was in rolling out the update to EVERYONE at once -- a blitz. Had they done a Canary deployment and slow-roll, the problems would have tiny
@2GuysTek
@2GuysTek Ай бұрын
100% I suspect there will be some significant changes to their deployment process for updates moving forward.
@MarceloSdeA
@MarceloSdeA Ай бұрын
This fail was unbelievable to be present nowadays! I have 35 years working in IT,. At college I´ve learned to test any software before deliver it in production, test environment, controlled test, implement it in a small piece of production environment, therefore this means for me that CrowdStrike guys need to return to the "basics" of software change management cycle...
@eointhomas2914
@eointhomas2914 Ай бұрын
I was on a similar call and there was 2 management people there with no IT Background, no idea why they were even there 😂
@luciogarzagarza2999
@luciogarzagarza2999 Ай бұрын
My computer is stuck in an infinite reboot loop, preventing me from accessing the command prompt or deleting any files. The repair options never appear, and I've tried all the methods to enter safe mode without success. I've pressed the F keys and repeatedly forced shutdowns with the power button, but nothing works. Despite all my efforts, the computer remains in this constant reboot loop.
@enviropediaxr6007
@enviropediaxr6007 Ай бұрын
Loved hearing this story! Unbelievable this could not be handled without direct IT people intervening. What are you suggesting for VMs for startups that want to colocate who do not want to get locked into the Broadcom ecosystem?
@2GuysTek
@2GuysTek Ай бұрын
Tough question to answer in a simple paragraph, but the short answer I would say is this - if you're a startup and you have the freedom to choose your deployments and want to take advantage of the 'cloud', I'd recommend you look for services that are cloud-first and not necessarily running on fat VMs in someone else's datacenter. But if you're looking to run VMs in a colo or in a hyperscaler like Azure, looking for providers that can offer you console access to your VMs is a huge benefit (something MS doesn't do.)
@hmedwards3
@hmedwards3 Ай бұрын
I wonder, was George Kurtz CTO of McAfee when they bricked all the windows systems with an update
@2GuysTek
@2GuysTek Ай бұрын
There's a twitter thread going around of his LinkedIn profile showing he was.
@martinkeatings7126
@martinkeatings7126 Ай бұрын
Still working - Shares in redbull went through the roof over the past 24 hours - or at least they would have if the systems were working right.
Люблю детей 💕💕💕🥰 #aminkavitaminka #aminokka #miminka #дети
00:24
Аминка Витаминка
Рет қаралды 1,2 МЛН
طردت النملة من المنزل😡 ماذا فعل؟🥲
00:25
Cool Tool SHORTS Arabic
Рет қаралды 32 МЛН
Running With Bigger And Bigger Feastables
00:17
MrBeast
Рет қаралды 195 МЛН
The FASTEST way to PASS SNACKS! #shorts #mingweirocks
00:36
mingweirocks
Рет қаралды 12 МЛН
My FBI Declassified Story
9:26
Marques Brownlee
Рет қаралды 6 МЛН
Life After VMware - A summary and comparison of hypervisors!
15:06
NEVER install these programs on your PC... EVER!!!
19:26
JayzTwoCents
Рет қаралды 3,3 МЛН
Tesla Solar Roof Review: Was it Worth It?
30:27
Marques Brownlee
Рет қаралды 13 МЛН
Exploring Proxmox from a VMware User's Perspective
24:53
2GuysTek
Рет қаралды 124 М.
Mac Fanboy Tries ARM Windows Laptops
31:40
Snazzy Labs
Рет қаралды 324 М.
This homelab server is absurd and I love it!
16:55
2GuysTek
Рет қаралды 15 М.
Do we really need NPUs now?
15:30
TechAltar
Рет қаралды 495 М.
PsyWar: Enforcing the New World Order | Dr. Robert Malone
1:14:12
misesmedia
Рет қаралды 1,1 МЛН
Люблю детей 💕💕💕🥰 #aminkavitaminka #aminokka #miminka #дети
00:24
Аминка Витаминка
Рет қаралды 1,2 МЛН