A brief overview of the history of Windows security & malware, the EU's antitrust case against Microsoft, and why antiviruses need to be in the kernel in the first place.
Пікірлер
@Yutappy996 ай бұрын
I did not understand a single thing but I feel sufficiently educated now to comment on Reddit like an expert on this topic.
Microsoft made it somewhat easier for Cloudstrike to make major mistakes, but it was Cloudstrike that neglected to not do the appropriate testing and phased distribution that should be done for software with such low level access.
@artysanmobile6 ай бұрын
Are you sure you understand how markets work?
@FrontLineNerd6 ай бұрын
It’s so clear that so many of you are commenting without having listened to, or processed the contents of this extremely complex and informative video. I’m a Mac and Linux guy who works with Windows managers and I’m learning more from this video than I do working full time with certified Windows engineers! Really great work.
@4870016096 ай бұрын
Crowdstrike is to blame for not being able to stage their updates. If we let an OS start without a critical component like an EDR, I think we should not operate on such machines
@tomstoob6 ай бұрын
true - but even with or without staged updates, it is blaringly obvious this software 'patch' WAS NOT tested at all and should NEVER have been released without good through testing. Crowdstrike is an untrustworthy company because 1) it does not test EVERY patch it released to its' kernel drivers and 2) it does not practice staged updating in every instance - if at all.
@petrihadtosignupforthis81586 ай бұрын
They were not parsing signature file for valid structure. They trusted the input. For many years. So it is not political or anything. Crowdstrike just pushed shitty code to production, that exploded with shitty Crowdstrike signature update. They have not fuzzy tested themselves...
@Jaker7886 ай бұрын
Not to mention them bypassing the Microsoft signature requirements for drivers by not updating the driver itself, but a config file the driver read. Which means they can change how the driver operates without updating it and getting another signature, despite being made a critical startup driver. Kinda defeats the spirit of signature required software @@tomstoob
@stephenalexander95586 ай бұрын
Agreed! Over the years I have been amazed in how more "business applications" were being managed much like Smartphone Applications! Everyone should recognize that MANY Smartphone Applications are updated on a WEEKLY to DAILY basis! This means that only small amount of testing to executed before pushing out to production! Why? Current view is that any "bugs found" would be fixed in the next release! In a perfect world of not mistakes, it is awesome for all machines/systems get the latest important updates! However, as the CrowdStrike situation proved, we still need to protect ourselves for complete shutdown of outages due to bad updates! Staggered updates give to to learn that there are issues and the latest update should be removed from production ASAP! Wow! 🍀🙀🌟 😇
@nosuchthing86 ай бұрын
Why should some random software company be allowed to push code into the kernel!
@ammarash54496 ай бұрын
"Fixing blue screens with more blue screens"
@guilherme50946 ай бұрын
Very good, I really like Dave's channel, I think it would be great to have you two talking about the subject.
@sergeyb60716 ай бұрын
Had the same idea, left a comment on Dave’s video about this too. Let’s make this happen folks.
@XatxiFly2 ай бұрын
This is such a great thorough analysis, I really appreciate the sophistication of your work and historical knowledge here! Got my sub.
@justacomment16576 ай бұрын
All due respect. But a bad business decision by microsoft did not deploy faulty code without staging around the globe. Crowdstrike neglected any - and i mean any, even the most basic, care in deploying, creating and testing that update. And they alsow managed to kill debian linux earlyer this year...so one could make a case for them beeing incompetent. And rightfully so. If a product is bad on microsoft windows because microsoft does not allow you to access the kernel in a smart way, sue them (class action), or limit its functionality. But they decided to backdoor their stupid written and lazy ass tested software, intentionally circumventing WHQL. Which js far bejind neglectance....thats intend. I would not be surprised if they get sued to oblivion over at least one of those points.
@ProjectBimmersАй бұрын
U have no idea what you are talking about. That is painfully obvious. U must like to go around saying a whole bunch of nothing
@KeijonAutoVuokra6 ай бұрын
Excellent video. Your expertise and presenting skills really show
@Trevellian6 ай бұрын
Great insight. Why do you think Crowdstrike seems to have had no validation, at all, on their channel file updates? Gross negligence?
@x_ph1l6 ай бұрын
Yep, no deployment strategy (deploy on small number of machines first to see if it works properly, then the rest), or the deployment strategy was skipped for some reason.
@Trevellian6 ай бұрын
@@x_ph1l Yes, they did not have a tiered deployment strategy, but it's actually worse than that. They didn't perform a sanity check test on a single Windows box. The Falcon parser running in the kernel was sent code updates multiple times each day. These aren't just definition files, they contain actual code that is run by the Falcon parser within the kernel. These 'channel files' weren't securely signed. The Falcon parser didn't perform a hash check. The Falcon parser didn't even look for a file header. There appears to have been no checks at all. Crowdstrike's kernel parser just accepted and ran whatever file it was sent. If even one of those validation steps had been in place (validation on a windows box, tiered deployment, signed channel file, file header in the channel file, hash check of the channel file), this would never have happened.
@grokitall6 ай бұрын
worse than that, the CEO said it was company policy due to the patches being so urgent that it would take too long to check them. i think he meant to say that it would take to long to go through the microsoft validation, but if not, he has no business having power over technical issues because he just does not know enough to make those calls. basically, if you don't have time to do it right and test it, you really don't have time to do it wrong and have to fix it.
@x_ph1l6 ай бұрын
@@grokitall wow, that's eye opening))
@geroffmilan33286 ай бұрын
Read the report which came out yesterday/today. They definitely did... and it was definitely inadequate. Like, power-cycling your test machines seems a pretty important part of the process, because it takes way less effort vs the rest of the test suite & will at least catch egregious errors like this one. Then you move on. Bonus: when code fails a unit test, maybe don't respond by fixing the unit test so the code passes unless you're very sure the test is broken.
@0kills6 ай бұрын
“Uniquely qualified” *locks in and watches the vid intently*
@ScarySox6 ай бұрын
Liked & subcribed at that point! 🤨
@nickellis-gowland79826 ай бұрын
Amazing historical view - best video on the subject!
@demeaningplebny13636 ай бұрын
Thank you for the insights! 👍 (Navigated here thanks to Steve Gibson and Security Now!)
@MalwareTechBlog6 ай бұрын
Thanks 🙏
@jonathansage67295 ай бұрын
Wow! This is the best video about this topic. When I heard about the Crowdstrike outage I immediately wanted your thoughts. Thank you so much for the historical details that helped explain why this happened. I'm not a programmer but I understood your explanation. Fantastic video. My big takeaway - Deploying without fully testing was Crowdstrike's error but Microsoft must take part of the blame for helping create the environment in which the error became so disruptive. I'm eagerly awaiting future videos from your channel!
@lorn48676 ай бұрын
Thanks for doing an analysis of the Crowdstrike crash without any yelling.
@Interminableable6 ай бұрын
Thank you for your perspective 🙏🏻
@freakmusicaddict6 ай бұрын
Why perspective, Dave is just wrong. Its not a perspective its just correct.
@Interminableable6 ай бұрын
A lot of history was covered and Marcus provided a retelling of it from his personal experience and added his opinion. I found it interesting and enlightening. Based on his very publicly documented expertise in this field, his views carry a lot of credence with me and his insights are valuable. Hence, my comment of gratitude. I'm afraid I know nothing of you or your expertise in this matter and therefore your unqualified assertion of fact carries very little credence with me whether I agree with you or not.
@user-dx3px4iv8p6 ай бұрын
Loved the insight! Calming voice! The only thing that would make the video even better for me is to have links to the sources in the video description. I know it's possible to manually find them all but it would be a nice touch.
@txorimorea38696 ай бұрын
Anybody who can't separate data from code is too incompetent to be trusted to run anything at kernel level. On top of that no code running at kernel level should be able to auto-update itself without the authorization of the IT administrator.
@udirt6 ай бұрын
Ooooooh-kay
@joshuablanchette8786 ай бұрын
I stumbled onto this channel and i really enjoyed your content. i look forward to seeing more.
@ethanrittenhouse76816 ай бұрын
I've been inspired to try my hand at cybersecurity thanks to you! I've been developing software for a while but this is a whole different ballgame lol. I've known of you since 2017 as most of us did, but just now found out you have a youtube channel. I have to say, it's an honor to be able to listen to a history maker like yourself.
@halofan074 күн бұрын
man i remember this day, im a fuel tech (keep gas stations/terminals pumping fuel) and when this hit, once i found out the fixes by mid day friday i had to teach other techs in our company how to fix it on point of sale systems, such a big fumble, and i fear something similar will happen again
@tonym58576 ай бұрын
I DO love to see this kind of video performed from a REAL PROGRAMMER who understand and know about O.S. 👏👏👏
@geroffmilan33286 ай бұрын
We have quite a similar background 😊 though I chose the more predictable route of a job managing a team of penetration testers. I like the rational, cool-headed presentation Marcus. New sub gained.
@taiquangong99126 ай бұрын
I truly enjoy your insight.
@senorbuen06 ай бұрын
as a rookie aspiring pentester I didn't understand 80% of this but that fact motivates me to keep learning as much as I can because these clearly aren't simple endeavors good god
@FAYSAL-SOMALI-UHURU6 ай бұрын
You are the best Channel in the tech world. And you are my Hero
@atrucrime4 ай бұрын
OMFG!!!! Yo, your that guy lol holy shit dude I for sure thought they took you to some black site lol. Yo please make a short video or course on how to RE a botnet so it can be mapped, nothing like learning from the master himself. I'm so stoked on finding your channel, hell yeah, keep at it homie.
@marcot85496 ай бұрын
If you WERE an EX-malware developer, then you ARE a malware developer NOW! BUSTEEEEEED! Great vid, thanks Marcus xx
@zipz76226 ай бұрын
He actually fixed a worldwide virus that cost people around 4 billion USD in damages, so when he got caught for his EX malware production he got very minimal punishment a KZbinr named "CrumbRS" made a really good video about it
@marcot85496 ай бұрын
@@zipz7622 Was just jibbing on it cos he said "was" an "ex", which means not an ex in present tense, ergo, he's a malware developer again today. It's not funny now I have to explain it.
@MadScientist5126 ай бұрын
@@marcot8549 appreciate the explanation as I surprisingly missed your wonderfully pedantic joke despite the capitalisation.
@marcot85496 ай бұрын
@@MadScientist512 I think most people missed my genius. It's hard being me sometimes.
@TN000NT6 ай бұрын
Was looking forward to this!
@john392726 ай бұрын
Really good high level overview of user permissions in windows thanks
@naesone26536 ай бұрын
Hyped to hear u speak about it and even more hyped that you are not afraid of going against dave garage his claim
@emilsdl6 ай бұрын
Crowdstr8ke should be consulting to MS because they are changing the kernel, lack of QA and certification to MS
@asicdathens6 ай бұрын
When Microsoft introduced a warning system that you are about to do something on your system intentionally or unintentionally, everyone disabled it because it was a nuisance
@therealmattplayer6 ай бұрын
Great explainer, thanks.
@8Dbaybled8D6 ай бұрын
can you give your thoughts on Apple's changes to the filesystem and generally how they're moving everything that's kernel related from any access points from userland?
@linearz6 ай бұрын
Were you referring to AMSI API for process injection (memory monitoring), or other API group?
@camelotenglishtuition63946 ай бұрын
Hi Marcus, this is a real long shot, but could i email you about some odd behaviour in macOS and how it handles some image formats?
@jeff58586 ай бұрын
Crumb video got me here.
@OwenKraweki6 ай бұрын
I could listen to you for hours
@stuartmcintosh9536 ай бұрын
Please bring back the MalwareTech podcast 😞
@zxuiji6 ай бұрын
Personally I think the solution lies in kernal processes, different from user processes. A user (and thus any user app) can kill any user mode process (even if they have to enter a password for root access) but they'd have to drop down to kernel level permissions to kill a kernel process. Anything that involves directly talking to hardware would be put in the kernel itself but for anything else it would involve pipes between kernel processes. The kernel can maintain the security of kernel processes and kernel processes can maintain the security of user processes. This new type of process would require the creation of a new user with greater permission than root which would resolve the problem of security being compromised due to users using admin accounts for their main account. It also means greater kernel stability because most of the kernel would be in kernel processes, with security & hardware code being the only exceptions. Could create something like klibc to share among the kernel processes too.
@IshayuG5 ай бұрын
I think the problem is also that clearly there was code or at least a sophisticated format being read into the kernel by way of these files being dropped in. Why are Microsoft certifying drivers with WHQL that change their behaviour based on the system files? Who says it had to be Crowdstrike who added this file? Could just as well have been a malicious actor who worked this out, and worse still maybe they would work out a way to craft a malicious file of this proprietary format and cause an exploit to reveal itself, allowing arbitrary code execution in the kernel space by escalating privileges through Crowdstrike.
@rackbites6 ай бұрын
When security is an afterthought rather than a core requirement of your OS ... you get Crowdstrike type mass outages ... will it be the last or just the first of many ... ???
@angrydachshund6 ай бұрын
Great vid, thank you. And grats on sanctifying out of bad ways, we are all born wicked but not all of us graduate from it!
@pcsecuritychannel6 ай бұрын
Crowdstrike is to blame for the Crowdstrike outage. Why do we always look for other excuses when multi billion dollar companies fail at basic quality controls. It's simply putting scaling and selling before building a quality product/service and in the case of Crowdstrike it couldn't be more obvious. We need to punish this behavior and not act as if they have no accountability because they are on the 'same team'. They did worse damage than most malware, and need to be treated accordingly.
@SB-cz9vo6 ай бұрын
It is nice to finally see someone from the US willing to look deeper than Microsoft's whining about the EU. MS tried to stack the deck in their favour and the EU called them out for it. Forcing someone to play on an even playing field is not forcing them to make their system vulnerable. Good move to call out Daves Garage and others for their skewed perspective. Trying to protect MS while blaming the EU. Apple standing in the background wondering what all the fuss is about is just the killing blow to the MS fanboys. Just insane.
@JonathanSwiftUK6 ай бұрын
If the kernel is ring 0, and user is ring 3, didn't they leave rings 1 and 2 for drivers and high privilege processes like malware protection, but didn't actually use them? But would this slow down Windows a lot? Remember in NT4 they moved at least part of the graphics drivers into ring 0, to save a lot of context switches.
@MC-kn6jl6 ай бұрын
The outage happened for a simple reason…absent of adequate software dev and release process with a bit of negligence. Would the “content update” (which was full of code!) had been tested, the outage would have been prevented.
@Argus00BFH6 ай бұрын
Welp, we finally got our Y2K, just 24 years later.
@Real-Name..Maqavoy6 ай бұрын
1:20-2:10 *Kernell* have always been a problem. Cause *Rootkits* expanded in those 'Early days'
@Dhushyanthkumar2225 ай бұрын
Hey Marcus, I’ve been getting really interested in learning ethical hacking and was wondering if you could help me out with some tips or guidance on where to start. I’d really appreciate any advice you can share!
@ilmurdaa5 ай бұрын
brother this dudes speaking a different alien language
@tomstoob6 ай бұрын
good deep dive into the historical problems individuals and businesses have experienced with Microsoft's deficiencies in the design of Windows OS's from the very earliest days of an operating system that was basically designed for individual users/standalone PC"s to its' migration to networks, business and corporate use. Can we blame Microsoft for the disaster of the CrowdStrike global crashing of computer systems? Indirectly, yes - but had CrowdStrike been run by competent and responsible CEO's who make sure their Falcon anti-malware software patches are FULLY TESTED before dumping them on en masse to millions of Windows networked PC's all around the world AND that they would only do such software patches via staged releases to their Falcon software clients, this disaster would not have occurred. If the first point was practiced by CrowdStrike then nothing would have occurred to Windows computers running Falcon software on July 19th and if point 2 had been implemented, the problem would have been quickly reported back to CrowdStrike's HQ and the staged releases to 'next-in-line' recipients of that Falcon software patch would not have gone ahead. So the blame has to be primarily with CrowdStrike's management of software patches distribution and secondly to Microsoft in a much less important sense. CrowdStrike Falcon software runs on Linux and MAC's too but this faulty Falcon software patch only occurred on Windows computers.
@grokitall6 ай бұрын
microsoft was responsible for not fixing the boot loop problem, which has been recurring since 2016, and is what caused the machines to stay down.
@tomstoob6 ай бұрын
@@grokitall CrowdStrike was the primary player at fault for the 2 reasons I listed
@grokitall6 ай бұрын
@@tomstoob i don't dispute that in any way, but microsoft is also liable due to not fixing the bug in 8 years which caused the machines to stay down, which is why the lawsuit from delta airlines is naming both while trying to recover the 500 million they lost due to the outage.
@Hexanitrobenzene6 ай бұрын
@@grokitall I would blame MS for allowing the Crowdstrike boot required driver to pass WHQL certification process. Since the driver reads external files, UNSIGNED BY MS, the parser should have been cross examined inside out and bombarded with all kinds of sane and insane things, including NULLs. Still, as many others pointed out, Crowstrike is mostly at fault here, since they didn't take even basic measures to avoid this failure.
@grokitall6 ай бұрын
@@Hexanitrobenzene i agree that crowdstrike caused this, but microsoft enabled it by not fixing known issues involved in this for many years. that is why they are also being named on the lawsuits.
@galen__6 ай бұрын
KB5028997 and KB5034441 plus Windows allowing the system to be locked from repair is why I’ve been giving CrowdStrike the benefit of the doubt. Microsoft now saying the EU caused Windows to be this far broken is bonkers. Microsoft has had over a decade to get this right and it’s only been getting worse.
@harveypaxton12326 ай бұрын
The blame is actually on the company IT managers for not having proper policies in place.
@MoiraWillenov6 ай бұрын
I do not want AV on my PC without being able to decide if I want it or not. Especially not at the KERNEL level.
@JustMe-ts8bn6 ай бұрын
Interesting on the EU judgement
@asdfasrfsradfsdafwefdsfsdc27496 ай бұрын
Wow, this is so interesting. I would love to see more content about such low-level techniques as described here.
@MalwareTechBlog6 ай бұрын
Probably more of a course thing than a KZbin thing
@FAYSAL-SOMALI-UHURU6 ай бұрын
@@MalwareTechBlogI know you are not doing this for the money You are doing it for the cause I believe that thousands percent
@Gandingas6 ай бұрын
Nah, this is on croudstrike, not microsoft
@dyu46346 ай бұрын
I feel the same too. If a renter rents my house and burns it down along with the whole neighbourhood, I'll be pissed if they hold me accountable.
@grokitall6 ай бұрын
@@dyu4634but the correct analogy would be the renter plugging something in which caused your faulty wiring to burn down your house and those of everyone else in the block. yes, they caused it by plugging in something way overpowered, but you enabled it by not fixing your faulty wiring, so you get to share the blame. same here with microsoft.
@nappucentertainment30046 ай бұрын
@@grokitallexactly
@gaBehcuoDsuoitneterP5 ай бұрын
7:46 Right now the EU, and other nations, wants backdoor access to people's private encypted communications for law enforcement puposes. Tho some companies, like Apple, argue this would also make it easier for bad actors to expoit - you can't have that stuff just for the good guys without the bad guys finding them as well. The eternal struggle continues.
@correabuscar6 ай бұрын
if Vin Diesel was into computers
@MadScientist5126 ай бұрын
Microsoft's IT monopoly is the real ongoing problem, and this incident SHOULD have raised questions about so many industries putting all their IT eggs in one corporate basket-case that the world comes crashing down in a single point of failure, but people couldn't see the Operating System behind the forest of Blue Screens seen all over the planet, 'cause it's all CrowdStrike's fault... :)
@lazymass6 ай бұрын
Yeah, using Linux would not help, crowdstrike caused Linux kernels to panic in the past also... But keep hatin if you wish so
@henson2k6 ай бұрын
Endpoint protection should be Windows functionality, opening kernels for random 3rd party companies is no different than introducing virus into the system. And then nobody is responsible for anything.
@grokitall6 ай бұрын
the only alternative to third party drivers is to have a limited number of all in one boards like apple has, then write all the drivers yourself. that solution looks worse than the problem. the better solution is to persistently track which module is starting, and if it crashes the kernel, disable it on reboot.
@grokitall6 ай бұрын
@@jbird4478 I'm not sure that is actually possible. while i don't doubt that processors have multiple rings as a security measure, what you are talking about is something like having a user mode in kernel space, which i can't see any way for the hardware to manage. this is why operating systems only use kernel mode and user mode. this additional mode would need you to tell tell it it could access this small range of memory, but none of the other memory, and while i can see how the operating system provide service functions to do so, it would not give you any advantages over providing those same functions to user space, and would have all the same context switching and message passing costs that are inherent in the microkernel model, which nobody has figured out how to make efficient since the 1970s when the idea was first proposed. for something like a serial port, communicating at 56 kilobits per second this could work as a user space driver, but for things like gigabit networking and external hard drives i am sure that the costs involved would slow it down too much, which puts us right back to having the drivers in kernel mode.
@JudgeFredd6 ай бұрын
Totally agree - it’s totally a Micro$oft fault
@LA-MJ6 ай бұрын
Fuzz your interpreters people. Write them in memory safe languages only.
@grokitall6 ай бұрын
this really bugs me. it does not matter what language you write in, it can have bugs. if it then runs in kernel mode without going through enough testing, it can crash the kernel. this was a kernel or user space issue, combined with lack of testing. language had nothing to do with it.
@Idontlikecringecontent6 ай бұрын
Bro you are my hero
@8kman06 ай бұрын
IMO as the details of outage were stated, both Microsoft and Crowdstrike are to blame. MS for not fixing this whole dangerous aproach long time ago and Crowdstrike for omiting best practices in favour of expediency of updates - injecting update thru uncertified file that is processed by kernel driver, instead of changing the driver and having it tested and re-certified by MS lab procedure. PS: As was hinted in several videos on the subject, Crowdstrike is not the only one who does this. I wonder for example, if Windows gaming anticheat technologies are not used to do this "hack" when updating as well. That is ofc just layman outlook. In the end, it will be down to technicalities of law and legal experts.
@grokitall6 ай бұрын
leonard french did a legal deep dive on his and to sum it up, both crowdstrike and microsoft have some exposure for gross negligence here, and lawsuits are being prepared against both.
@grokitall6 ай бұрын
leonard french did a legal deep dive on his and to sum it up, both crowdstrike and microsoft have some exposure for gross negligence here, and lawsuits are being prepared against both.
@simontillson4826 ай бұрын
Games don’t install their own kernel drivers, so it’s not even slightly a similar thing. They generally use installer-level patches for updates, and that would go for anti-cheat updates to control new cheat strategies as well.
@leonzewe6 ай бұрын
@@simontillson482 This used to be true but a lot has changed in the last 5 years. Many games employ kernel level anticheat nowadays (see Valorant as an example). They actually do deploy their anticheat as kernel drivers, and yes, its bad.
@simontillson4826 ай бұрын
@@leonzewe Wow, that is indeed news to me. Seems a rather over the top solution. I bet it hasn’t eliminated cheating either - there’s so many ways to modify online gaming that don’t even need to change the game itself. I’ll do some reading, thanks for the tip.
@Corteum6 ай бұрын
What's are some examples of a good windows ecurity product that does not require kernel access at all?
@MalwareTechBlog6 ай бұрын
Unplugging the computer
@Corteum6 ай бұрын
@@MalwareTechBlog So there's really no practical solution to this problem yet.
@MalwareTechBlog6 ай бұрын
Not until Microsoft makes user mode replacements for all the capabilities security products need
@grokitall6 ай бұрын
firewalls can now be implemented in user space, on access virus scanners can as well, and packet filtering. it all depends on what parts have been made visible to user space.
@Corteum6 ай бұрын
@@MalwareTechBlog What about TDSSKiller or GMER?
@christopherstaples67586 ай бұрын
@15:20 are you talking about "Daves Garage" ?
@gamingthunder63056 ай бұрын
im sure he is.
@midknight13396 ай бұрын
He is; he refers to that channel at the start of the video
@jimg28506 ай бұрын
I'm sure Crowdstrike insisting that this was not Microsoft's fault is nothing to do with them depending on Microsoft for their market.
@Igbon56 ай бұрын
Have you addressed the other factor Dave considered comparing Microsoft to Apple? Apple doesn't care about backward compatibility. I suppose that's ok with a smallish cult like user base, but Windows is dedicated to ensuring backward capability and with the relative depth and breadth of the user base compared to Apple that seems to me to be a significant factor.
@tutacat6 ай бұрын
why anyone used administrator accounts as daily accounts on windows
@goobye99805 ай бұрын
W Marcus, I just watched the video on his life
@ibizenco5 ай бұрын
Loading "third party" programs into the kernel sounds like a bad method. Microsoft should find another/better way.
@unpronouncable24426 ай бұрын
This is the first time I hear someone mentioned EU as a party to blame. I know blaming windows is popular but I think the fault is on Crowdstrike you know. the party responsible for pushing an empty file for the sensor to use?
@grokitall6 ай бұрын
microsoft tried to throw the EU under the bus to distract from the fact they have not fixed the boot loop bug since 2016. everyone but fan boys immediately called it out as bs.
@MatthewSuffidy6 ай бұрын
At a fundamental level though is Microsoft legally responsible for crashes caused by 3rd party software? Probably not. You are claiming the 3rd parties had no choice but provide products as necessary? Maybe it just comes down to who caused the crash, would be cloudstrike?
@MalwareTechBlog6 ай бұрын
No, they're not legally responsible for the crash, they just made the conditions that forced antimalware products to behave in this way.
@RunicSigils6 ай бұрын
@@MalwareTechBlogReally the point stands though that it was a known thing, so the one doing the update should have been checking. It's like blaming your car manufacturer because you were injured in a car crash in a way that would only happen if the airbag wasn't there.... After YOU took the airbag out. You can argue about whether or not the way it works is good, but it's not their fault in any sense of the word. It's like when people blame Nintendo for some Switch ports not being very good, even though it was the developer or publisher cheaping out and not doing a good port. There's no such thing as a system that can't run a game (most ports used to be at least somewhat custom made for the system for a reason), only a game that a dev or publisher is not willing to put any effort into, so it's not Nintendo's fault even though they're the ones that chose to have a lesser-powered system. The devs and publisher are the ones who are joining onto a system and then not doing the work necessary to make sure it works well. Just like Crowdstrike did.
@grokitall6 ай бұрын
@@RunicSigilsactually, microsoft have had recurrences of the boot loop problem since 2016. the fix is also fairly simple, they just have not done it, leaving them potentially liable under gross negligence laws. the eula only provides a get out of jail free card to the extent allowed by law, which does not cover negligence.
@nosuchthing86 ай бұрын
Its clear they need THREE levels, not two.
@p72726 ай бұрын
The tile alone gets a thumbs up from me. I can't so many people are letting MS off the the hook when it's their DAMN house that Crowstrike is Fn up!!! Also glad you mentioned Dave's Garage because he was trying to let MS off the hook.
@wesch42326 ай бұрын
Not true. OS cannot be the policeman to prevent all security software mistakes from happening. Crowdstrike also affected Linux at April 2024 timeframe. So no OS alone have real fix.
@shexec326 ай бұрын
Microsoft did provide the ELAM driver infrastructure as a supported way of hooking into kernel activity (which is what Crowdstrike uses). It's just that Crowdstrike deployed inherently unsafe code, and ran it in an unsafe privileged context. If they ran their configuration code in Ring 3, there would have been no BSoD. If they ran their code in the safety of a sandbox, windows would not have blue screened If they tested their own code properly, their driver would not have BSoDed. If they implemented their automated deployments correctly, the faulty 291 file would never have reached everyone's machines. If they implemented proper memory probing and error checking in their driver, it would never have bug checked. Their subreddit was filled for three years with end users complaining about their driver causing blue screens. If Crowdstrike not ignored those warnings, they would have found their kernel driver was fundamentally broken, would have hired developers to fix it, and we would not have seen the outages that occurred this month. The only place where Microsoft went wrong is granting Crowdstrike their WHQL stamp of approval. Though Microsoft should have seen in their Windows telemetry that CSAgent.sys is not a driver that deserves to bear the WHQL certificate.
@MalwareTechBlog6 ай бұрын
No, ELAM was provided as a way for antivirus drivers to start before other 3rd party drivers. It doesn't solve any of the problems discussed in this video.
@RosalandWhite6 ай бұрын
Hello! Marcus I wanted to know if, you ever thought about creating a security software for individuals and businesses to help secure their personal online data and financial data against computer hackers, ramsonware and identity thieves. And showing more online how people can block hackers from sending viruses into their computer systems. Offering a free and paid software and videos. Creating simple software and videos that teach beginners how to code in creating technical products like a computer operating system to video games. Take care and thanks.
@27july19546 ай бұрын
No. It is CrowdStrike's fault. They pushed out the defective software, not Microsoft or the EU.. It is the EU who forced Microsoft to allow third party software operate at the Kernel level. Microsoft did not want to allow this, they were forced to by the EU. That is why it is argued it is the EU's fault. No. It is CrowdStrike's fault. They pushed out the defective software, nobody else.
@NinjaRunningWild6 ай бұрын
The person or company that does a thing is responsible for having done it. The end. No further logic needs to be applied.
@nosuchthing86 ай бұрын
I blame society!!!😂
@artysanmobile6 ай бұрын
Microsoft blew it. No excuse.
@dasistgeheim10676 ай бұрын
Hey, nice vid. Couldnt think of anyone who could explain this to such a level of quality. 9:34 maybe fix the vouln in your seiling btw.
@Biggyshuvt6 ай бұрын
this is all helpful info but would you mind citing your sources? possibly adding them to the description. it will help with researching. thanks
@MalwareTechBlog6 ай бұрын
Which parts are you looking for sources for?
@utensilapparatus86926 ай бұрын
Liked and Left 😊
@dm30356 ай бұрын
What about MUSHROOMS ? 🤔 🤔 🤨
@deek608196 ай бұрын
Bro... did you not get your gift card? what's it gonna take, $15?! 🤯
@Tr3xShad6 ай бұрын
KZbinrs hey smh, in that case I guess many of us are ridiculously over qualified to speak on this but we are not KZbinrs, we still do the work we do 😂
@MalwareTechBlog6 ай бұрын
Not posting on KZbin wasn’t a qualification last I checked
@thechosenoneforyou6 ай бұрын
Welp this didn't age well 😭
@MalwareTechBlog6 ай бұрын
L comment
@alex_zetsu6 ай бұрын
No I'm going to side with Microsoft that once it let antivruses see signatures in user mode, they have most of what they need, signature and network motioning, not EDR. the fact that they still needed kernel protection from being removed by malware is a fair argument. Ok to be fair I'm a pleb and not an expert, but even if you're right that Microsoft needed to let antiviruses into the kernel, this explanation needs to be clarified and more specific since it doesn't sound convincing to a typical officer worker compared to Dave.
@MalwareTechBlog6 ай бұрын
Signature and network monitoring is not “most of what they need” the entire EDR market exists because of that
@shexec326 ай бұрын
The WHQL driver requirement predates Windows 7 and Vista. The thing where Windows refused to install drivers that weren't WHQL signed, started with the Windows XP operating system (though the WHQL itself is much older than that).
@MalwareTechBlog6 ай бұрын
The Windows 10 process is different. It requires an Extended Validation code signing certificate issued by Microsoft themselves, which requires you to go through Microsoft's own validation process. Previously any code signing certificate was suffice.
@jeffreybassett99186 ай бұрын
in MY view - the fact that CrowdStike is using a MS Certified driver -- that went thru the certification - NOW we learn that it is ALLOWED to run off and execute code that has NOT been validated as safe - (the driver needs to check that everything that it is going to execute is a valid safe set of code) (I get it their patch was bad we know that even the most basic validation of the crowdStrike file this would have not caused the issue - to ME - Microsoft needs to TIGHTEN the certification process why can a CERTIFIED TO BE SAFE kernal driver - load ANY code to execute without checks that the code is valid - think of an emulator that runs emulation - hmmm, that emulated instruction is not legal - so - I am NOT going to allow you to execute (or TRY to execute code that we know is not valid - THROW an error - sorry bub - that will not fly - so - sure the crwowstrike patch would have received ERROR - messages but NOT caused a BSOD ( which of course is doing exactly what it was designed to do - PROTECTING the system ) I,E. there can be and possibly should be recovery from an attempt to execute an INVALID set of code - instead of throwing up BSOD - additional recovery from that situation migh also be a solution. JTB
@7_of_95 ай бұрын
Use built-in antivirus, keep admin privileges to ONLY those admins who actually know wtf they are doing. Move on!
@2rx_bni6 ай бұрын
Microsoft is just so insecure as to be laughable. I don't understand why they still are so popular. People can take free classes to switch to Apple, and Linux is getting easier to use. Windows is an embarassing joke, Azure sucks for stability and Sharepoint is a curse. I just...hate them a lot actually.
@pseudonymity00006 ай бұрын
Apple did NOT "remove all security products from the kernal, but gave them all the same capabilitys in user mode"... That is a function of UNIX, the base of MacOS and iOS. Unix OS's and there derivatives are all about keeping as much out of ring zero as possible, as it should be. Frankly, if Microsoft was making a move to do this years ago and was prevented by bureaucracy, I'm not really going to blame Microsoft for this. You make it sound like that they were just kicking them out the kernel arbitrarily, and that malware writer's would have still had an easy time making malware while the antivirus people were left in the dust... However, this is not the case as the planned roll out during this time was to also introduce VBS (Virtualization based security). By the very nature of virtualization, nothing would have any idea about the underlying system, not even malware. It is a very difficult task to break out of a virtual machine, as a lot of the Isolation security is then enforced at the processor/hypervisor level. This technology was then delayed for mass market, and only started sprouting up again until Windows 10 came around. Yes, the antivirus people would have lost a lot of capabilities to hook into the kernel, and install their rootkits to fight the root kits. But so would the malware developers. You make it sound like the malware developers would have still been kicking these things out on a lazy afternoon as if it's business as usual, On the assumption that it was on the same security paradigm. That was simply not the case... Well, that was until the antivirus companies sued, Ironically, putting system security back. Frankly, everything needs to be out of ring zero that doesn't need to be there. Windows got a lot more stable after they kicked a lot of driver functions out of the kernel. Now, if your graphics card or wifi adapter has a hiccups, you are more likely to get a simple flash to black or A blip in your Internet connection as the driver reboots, rather then a BSOD. The key thing here is Linux and Unix, which follow the philosophy of keeping as much as possible out of Ring0 Unless thoroughly tested, was not affected. So yes, the problem was arbitrary things run in ring zero, and anything which prevented the kicking out of this privilege level is to blame. That be the Antivirus vendors and the EU. Yes, you can argue that they had their APIs and. the virus vendors had others, but this is not really any different to how Windows runs anyway. There are a lot of API's that are not exposed to developers, and are for the internal turnings of the window system. You also have to consider the conflict of interest here. Defending the anti virus companies as if they were the poor pitiful victim to Microsoft's locking down of their products is actually quite amusing. Just like how a drug company does not want to make a cure, but would rather make a treatment. An antivirus company would not want there to be a cure to a security issue. They want to be the treatment. Maybe it is that they sued because they knew that this move to harden up Window security would severely impact their business, As the skill level to craft successful malware would have risen significantly making it less prevalent. It would also mean that the caliber of engineers they would need to hire to get there anti malware to brake out of the VM and into the base kernel, Without causing any problems, would have also of risen. This would of Increased their expenditure on wages for such talented teams. The fact is, when you're operating on ring zero, There be dragons... If your software requires entering the land of Dragons, Then you better respect and come prepared For evading them. Crowd strike did not do so, and managed to send an update out which was nothing but zeros... All they had to do was run the update to test targets before going live. They evidently didn't do this and through caution to the wind, and well... The Dragons came. On Linux and Unix, if you enter the realm of Dragons, and mess up so bad you caused your system to fry. Linux isn't blamed... You are blamed... You entered the realm of Dragons and was not prepared. You Touched what you should not have touched... The kernel Developer isn't blamed for not making it friendly and easy for you by giving you a nice tamed dragon to pet. The blame lies entirely on those who entered the realm of dragons through pure hubris, and did not respect the land of which they steped.
@grokitall6 ай бұрын
any general purpose kernel running on user selectable hardware requires kernel mode third party drivers. even linux has them with the nvidea drivers. if that driver has a bug, it can crash the kernel. it is that simple. however there are things that can be done which can help recovery, none of which is done in windows.
@Ichi.Capeta6 ай бұрын
man, MAC users on twitter/X must be embarrass and delete their tweet by now. So quick to jump on the wagon shitting on MS
@tutacat6 ай бұрын
the kernel is supposed to block unprivileged access from the beginning. to do otherwise is to write a bad kernel.