This isn’t a gloat post. In fact, I was completely oblivious to this massive outage until I tried to check my bank balance and it wouldn’t log in.

Apparently Visa Paywave, banks, some TV networks, EFTPOS, etc. have gone down. Flights have had to be cancelled as some airlines systems have also gone down. Gas stations and public transport systems inoperable. As well as numerous Windows systems and Microsoft services affected. (At least according to one of my local MSMs.)

Seems insane to me that one company’s messed up update could cause so much global disruption and so many systems gone down :/ This is exactly why centralisation of services and large corporations gobbling up smaller companies and becoming behemoth services is so dangerous.

  • fireshell@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    2 months ago

    Microsoft should test all its products on its own computers, not on ours. Made an update, tested it and only then posted it online.

    • Fonzie!@ttrpg.network
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      That’s potentially life threatening. I wonder if 112 in other countries is affected, it shouldn’t be but at this point I’m afraid it is.

    • NaN@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      In the US 911 is decentralized, so widespread things will always affect it in some places. Solarwinds hack was another one.

      Assuming the entire phone system isn’t down, there are typically very shitty to deal with workarounds for CAD outages.

  • suoko@feddit.it
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    A couple of days ago a Windows 2016 server started a license strike in my farm … Coincidence?

  • SitD@lemy.lol
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    2 months ago

    I love how everyone understands the issue wrong. It’s not about being on Windows or Linux. It’s about the ecosystem that is common place and people are used to on Windows or Linux. On windows it’s accepted that every stupid anticheat can drop its filthy paws into ring 0 and normies don’t mind. Linux has a fostered a less clueless community, but ultimately it’s a reminder to keep vigilant and strive for pure and well documented open source with the correct permissions.

    BSODs won’t come from userspace software

    • Nonagon ∞ Orc@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      While that is true, it makes sense for antivirus/edr software to run in kernelspace. This is a fuck-up of a giant company that sells very expensive software. I wholeheartedly agree with your sentiment, but I mostly see this as a cautionary tale against putting excessive trust and power in the hands of one organization/company.

      Imagine if this was actually malicious instead of the product of incompetence, and the update instead ran ransomware.

      • nexussapphire@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        If it was malicious it wouldn’t have had the reach a trusted platform would. That is what made the xz exploit so scary was the reach and the malicious attempt.

        I like open source software but that’s one big benefit of proprietary software. Not all proprietary software is bad. We should recognize the ones doing their best to avoid anti consumer practices and genuinely try to serve their customers needs to the best of their abilities.

      • SitD@lemy.lol
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        1 month ago

        That’s precisely why I didn’t blame windows in my post, but the windows-consumer mentality of “yeah install with privileges, shove genshin impact into ring 0 why not”

        Linux can have the same issue. We have to keep the culture on our side here vigilant and pure near the kernel.

      • Skankhunt42@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        1 month ago

        I deployed it for my last employer on our linux environment. My buddies who still work there said Linux was fine while they had to help the windows Admins fix their hosts.

  • Angry_Autist (he/him)@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    Is there an easy way to silence every fuckdamn sanctimonious linux cultist from my lemmy experience?

    Secondly, this update fucked linux just as bad as windows, but keep huffing your own farts. You seem to like it.

    • Morphit @feddit.uk
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      I’d unsubscribe from !linux for a start.

      I’m pretty sure this update didn’t get pushed to linux endpoints, but sure, linux machines running the CrowdStrike driver are probably vulnerable to panicking on malformed config files. There are a lot of weirdos claiming this is a uniquely Windows issue.

      • Angry_Autist (he/him)@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        2 months ago

        Thanks for the tip, so glad Lemmy makes it easy to block communities.

        Also: It seems everyone is claiming it didn’t affect Linux but as part of our corporate cleanup yesterday, I had 8 linux boxes I needed to drive to the office to throw a head on and reset their iDrac so sure maybe they all just happened to fail at the same time but in my 2 years on this site we’ve never had more than 1 down at a time ever, and never for the same reason. I’m not the tech head of the site by any means and it certainly could be unrelated, but people with significantly greater experience than me in my org chalked this up to Crowdstrike.

  • monoboy@lemmy.zip
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    Didn’t Cloudstrike have a bad update to Debian systems back in April this year that caused a lot of problems? I don’t think it was a big thing since not as many companies are using Cloudstrike on Debian.

    Sounds like the issue here is Cloudstrike and not Windows.

  • Asidonhopo@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    US and UK flights are grounded because of the issue, banks, media and some businesses not fully functioning. Likely we’ll see more effects as the day goes on.

  • beeng@discuss.tchncs.de
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    This is exactly why centralisation of services and large corporations gobbling up smaller companies and becoming behemoth services is so dangerous.

    Its true, but otherside of same coin is that with too much solo implementation you lose benefits of economy of scale.

    But indeed the world seems like a village today.

    • digdilem@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      you lose benefits of economy of scale.

      I think you mean - the shareholders enjoy the profits of scale.

      When a company scales up, prices are rarely reduced. Users do get increased community support through common experiences especially when official channels are congested through events like today, but that’s about the only benefit the consumer sees.

  • aard@kyu.de
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    The annoying aspect from somebody with decades of IT experience is - what should happen is that crowdstrike gets sued into oblivion, and people responsible for buying that shit should have an epihpany and properly look at how they are doing their infra.

    But will happen is that they’ll just buy a new crwodstrike product that promises to mitigate the fallout of them fucking up again.

    • 0x0@programming.dev
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      decades of IT experience

      Do any changes - especially upgrades - on local test environments before applying them in production?

      The scary bit is what most in the industry already know: critical systems are held on with duct tape and maintained by juniors 'cos they’re the cheapest Big Money can find. And even if not, There’s no time. or It’s too expensive. are probably the most common answers a PowerPoint manager will give to a serious technical issue being raised.

      The Earth will keep turning.

      • ik5pvx@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        2 months ago

        Unfortunately falcon self updates. And it will not work properly if you don’t let it do it.

        Also add “customer has rejected the maintenance window” to your list.

        • marcos@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          2 months ago

          Well, “don’t have self-upgrading shit on your production environment” also applies.

          As in “if you brought something like this, there’s a problem with you”.

      • goodgame@feddit.uk
        link
        fedilink
        arrow-up
        0
        ·
        2 months ago

        some years back I was the ‘Head’ of systems stuff at a national telco that provided the national telco infra. Part of my job was to manage the national systems upgrades. I had the stop/go decision to deploy, and indeed pushed the ‘enter’ button to do it. I was a complete PowerPoint Manager and had no clue what I was doing, it was total Accidental Empires, and I should not have been there. Luckily I got away with it for a few years. It was horrifically stressful and not the way to mitigate national risk. I feel for the CrowdStrike engineers. I wonder if the latest embargo on Russian oil sales is in anyway connected?

        • 0x0@programming.dev
          link
          fedilink
          arrow-up
          0
          ·
          2 months ago

          I wonder if the latest embargo on Russian oil sales is in anyway connected?

          Doubt it, but it’s ironic that this happens shortly after Kaspersky gets banned.

      • HumanPenguin@feddit.uk
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        Not OP. But that is how it used to be done. Issue is the attacks we have seen over the years. IE ransom attacks etc. Have made corps feel they needf to fixed and update instantly to avoid attacks. So they depend on the corp they pay for the software to test roll out.

        Autoupdate is a 2 edged sword. Without it, attackers etc will take advantage of delays. With it. Well today.

        • 0x0@programming.dev
          link
          fedilink
          arrow-up
          0
          ·
          edit-2
          2 months ago

          I’d wager most ransomware relies on old vulnerabilities. Yes, keep your software updated but you don’t need the latest and greatest delivered right to production without any kind of test first.

          • HumanPenguin@feddit.uk
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            Very much so. But the vulnerabilities do not tend to be discovered (by developers) until an attack happens. And auto updates are generally how the spread of attacks are limited.

            Open source can help slightly. Due to both good and bad actors unrelated to development seeing the code. So it is more common for alerts to hit before attacks. But far from a fix all.

            But generally, time between discovery and fix is a worry for big corps. So why auto updates have been accepted with less manual intervention than was common in the past.

            • SayCyberOnceMore@feddit.uk
              link
              fedilink
              English
              arrow-up
              0
              ·
              2 months ago

              I would add that a lot of attacks are done after a fix has been released - ie compare the previous release with the patch and bingo - there’s the vulnerability.

              But agree, patching should happen regularly, just with a few days delay after the supplier release it.

        • Avatar_of_Self@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          2 months ago

          I get the sentiment but defense in depth is a methodology to live by in IT and auto updating via the Internet is not a good risk to take in general. For example, should Crowdstrike just disappear one day, your entire infrastructure shouldn’t be at enormous risk nor should critical services. Even if it’s your anti-virus, a virus or ransomware shouldn’t be able to easily propagate through the enterprise. If it did, then it is doubtful something like Crowdstrike is going to be able to update and suddenly reverse course. If it can then you’re just lucky that the ransomware that made it through didn’t do anything in defense of itself (disconnecting from the network, blocking CIDRs like Crowdsource’s update servers, blocking processes, whatever) and frankly you can still update those clients anyway from your own AV update server which is a product you’d be using if you aren’t allowing updates from the Internet in order to roll them out in dev first, phasing and/or schedules from your own infrastructure.

          Crowdstrike is just another lesson in that.

  • SeattleRain@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    It’s proving that POSIX architecture is necessary even if it requires additional computer literacy on the part of users and admins.

    The risk of hacking (which is what Crowdstrike essentially does to get so deeply embedded and be so effective at endpoint protection) a monolithic system like Windows OS is if you screw up the whole thing comes tumbling down.

      • digdilem@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        That’s an old alert. We run CS on Linux as well and have not encountered this issue in the two years we’ve had it going.

          • digdilem@lemmy.ml
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            This specific issue was triggered today by a microsoft update - that’s something else.

            Agree it may be indicative of poor quality software control, but it’s not this.

            • NaN@lemmy.sdf.org
              link
              fedilink
              English
              arrow-up
              0
              ·
              edit-2
              2 months ago

              This specific issue is different than the other specific issue, correct.

              The point is, “this could only happen on windows” is wrong.

    • Simmy@lemmygrad.ml
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      I’ve heard not all Windows versions are effect by Crowdstrike depending if it was recently updated or not. It’s not clear which versions are effected. One other thing I thought Windows has a micro Kernel, and Linux is monolithic.