1247
Malware As A Service (sh.itjust.works)
top 50 comments
sorted by: hot top controversial new old
[-] Logh@lemmy.ml 131 points 3 months ago

Funny how CrowdStrike already sounds like some malware’s name.

[-] dmention7@lemm.ee 75 points 3 months ago

It literally sounds like a DDoS!

[-] bruhduh@lemmy.world 21 points 3 months ago

Botnet if you will

[-] SkyNTP@lemmy.ml 21 points 3 months ago

Not too surprising if the people making malware, and the people making the security software are basically the same people, just with slightly different business models.

[-] Excrubulent@slrpnk.net 10 points 3 months ago* (last edited 3 months ago)

Reminds me of the tyre store that spreads tacks on the road 100m away from their store in the oncoming lanes.

People get a flat, and oh what do you know! A tyre store! What a lucky coincidence.

load more comments (1 replies)
load more comments (1 replies)
[-] Carighan@lemmy.world 120 points 3 months ago

This is, in a lot of ways, impressive. This is CrowdStrike going full "Hold my beer!" about people talking about what bad production deploy fuckups they made.

[-] henfredemars@infosec.pub 90 points 3 months ago

You know you’ve done something special when you take down somebody else’s production system.

[-] bruhduh@lemmy.world 24 points 3 months ago

*production systems around whole world

load more comments (1 replies)
[-] KomfortablesKissen@discuss.tchncs.de 18 points 3 months ago

I'm volunteering to hold their beer.

Everyone remember to sue the services not able to provide their respective service. Teach them to take better care of their IT landscape.

[-] ricecake@sh.itjust.works 23 points 3 months ago

Typically auto-applying updates to your security software is considered a good IT practice.

Ideally you'd like, stagger the updates and cancel the rollout when things stopped coming back online, but who actually does it completely correctly?

[-] KomfortablesKissen@discuss.tchncs.de 20 points 3 months ago

Applying updates is considered good practice. Auto-applying is the best you can do with the money provided. My critique here is the amount of money provided.

Also, you cannot pull a Boeing and let people die just because you cannot 100% avoid accidents. There are steps in between these two states.

[-] ricecake@sh.itjust.works 27 points 3 months ago

you cannot pull a Boeing and let people die

You say that, but have you considered the savings?

[-] Iheartcheese@lemmy.world 21 points 3 months ago

People are temporary. Money is forever.

[-] KomfortablesKissen@discuss.tchncs.de 6 points 3 months ago* (last edited 3 months ago)

I have. They are not mine. The dead people could be.

Edit: I understand you were being sarcastic. This is a topic where I chose to ignore that.

[-] ricecake@sh.itjust.works 8 points 3 months ago

That's totally fair. :)

I work at a different company in the same security space as cloudstrike, and we spend a lot of time considering stuff like "if this goes sideways, we need to make sure the hospitals can still get patient information".

I'm a little more generous giving the downstream entities slack for trusting that their expensive upstream security vendor isn't shipping them something entirely fucking broken.
Like, I can't even imagine the procedureal fuck up that results in a bsod getting shipped like that. Even if you have auto updates enabled for our stuff, we're still slow rolling it and making sure we see things being normal before we make it available to more customers. That's after our testing and internal deployments.

I can't put too much blame on our customers for trusting us when we spend a huge amount of energy convincing them we can be trusted to literally protect all their infrastructure and data.

load more comments (12 replies)
[-] Legendarylootz@lemmynsfw.com 98 points 3 months ago

The real malware is the security software we made along the way.

[-] WhiskyTangoFoxtrot@lemmy.world 39 points 3 months ago

We've known that since Norton and McAfee.

[-] mnemonicmonkeys@sh.itjust.works 10 points 3 months ago

At least McAfee's antics were entertaining

load more comments (1 replies)
load more comments (1 replies)
[-] PriorityMotif@lemmy.world 54 points 3 months ago

Can't get hacked if your machine isn't running.

[-] jaybone@lemmy.world 19 points 3 months ago
load more comments (1 replies)
[-] psycho_driver@lemmy.world 48 points 3 months ago

The answer is obviously to require all users to change their passwords and make them stronger. 26 minimum characters; two capitals, two numbers, two special characters, cannot include '_', 'b' or the number '8', and most include Pi to the 6th place.

[-] ulterno@lemmy.kde.social 9 points 3 months ago

Great! Now when I brute force the login, I can tell my program to not waste time trying '_', 'b' and '8' and add Pi to the 6th place in every password, along with 2 capitals, 2 numbers and 2 other special characters.

Furthermore, I don't need to check passwords with less than 26 characters.

[-] arendjr@programming.dev 7 points 3 months ago

Sorry, I don’t understand. Do you mean there have to be 6 digits of Pi in there, or the sixth character must be π? I’m down either way.

[-] chiliedogg@lemmy.world 28 points 3 months ago

We won't tell you, and the rule gets re-rolled every 14 seconds. It may stay the same or it may change.

load more comments (1 replies)
load more comments (4 replies)
[-] clearedtoland@lemmy.world 21 points 3 months ago

What’s the saying about dying a hero or becoming the villain?

[-] Solemarc@lemmy.world 16 points 3 months ago

Maybe this is a case of hindsight being 20/20 but wouldn't they have caught this if they tried pushing the file to a test machine first?

[-] tabularasa@lemmy.ca 12 points 3 months ago

It's not hindsight, it's common sense. It's gross negligence on CS's part 100%

load more comments (1 replies)
[-] Gsus4@programming.dev 11 points 3 months ago

I saw one rumor where they uploaded a gibberish file for some reason. In another, there was a Windows update that shipped just before they uploaded their well-tested update. The first is easy to avoid with a checksum. The second...I'm not sure...maybe only allow the installation if the windows update versions match (checksum again) :D

load more comments (1 replies)
[-] undu@lemmy.world 6 points 3 months ago

It's a sequence of problems that lead to this:

  • The kernel driver should have parsed the update, or at a minimum it should have validated a signature, before trying to load it.
  • There should not have been a mechanism to bypass Microsoft's certification.
  • Microsoft should never have certified and signed a kernel driver that loads code without any kind signature verification, probably not at all.

Many people say Microsoft are not at fault here, but I believe they share the blame, they are responsible when they actually certify the kernel drivers that get shipped to customers.

[-] slazer2au@lemmy.world 12 points 3 months ago

Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)

[-] marcos@lemmy.world 6 points 3 months ago

Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.

[-] jet@hackertalks.com 12 points 3 months ago

A real Anakin arc right here.

[-] pkill@programming.dev 9 points 3 months ago

SHOULD'VE USED OPENBSD LMAO

[-] Ptsf@lemmy.world 6 points 3 months ago* (last edited 3 months ago)
load more comments
view more: next ›
this post was submitted on 19 Jul 2024
1247 points (99.4% liked)

Programmer Humor

19450 readers
707 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 1 year ago
MODERATORS