The Biggest IT Outage Ever Explained - CrowdStrike Strikes Bad !!!

Поділитися
Вставка
  • Опубліковано 8 лис 2024

КОМЕНТАРІ • 13

  • @DavidCandelaMartinez
    @DavidCandelaMartinez 3 місяці тому +1

    Thanks for the quick explanation! It affected massively the airport of my city just in the worse possible time now that all the tourists are arriving and locals flying out for vacation. Crazy to think that these companies don't have a test environment.

    • @lab_cyber
      @lab_cyber  3 місяці тому

      Oh wow that sucks. Regarding the testing environment, yes so many companies don't have them but perhaps this might serve as a wake up call for them

  • @KOSisNeeded
    @KOSisNeeded 3 місяці тому +2

    Good video, it's amazing that these big companies didn't do what you said. No QA environment, ouch!!!

    • @lab_cyber
      @lab_cyber  3 місяці тому

      Well many of these companies make the mistake of trusting the developers of the software they use.

  • @Espi68One
    @Espi68One 3 місяці тому

    They need to watch your security video on Testing in sandbox or VM environment .

  • @ramonj7113
    @ramonj7113 3 місяці тому

    Thanks for the timely update. I understand now what happened..

  • @nyviaross3588
    @nyviaross3588 3 місяці тому

    Thanks Alex!

  • @DanMillerXYZ
    @DanMillerXYZ 3 місяці тому

    ChatGPT is telling me it was a supply chain attack on Crowd Strike.
    "The supply chain attack on CrowdStrike involved the compromise of the XZ Utils data compression library, specifically versions 5.6.0 and 5.6.1, as identified by the CVE-2024-3094 vulnerability. This attack inserted malicious code into the library, which is commonly used in various Linux distributions. The malicious code aimed to create a backdoor, potentially allowing unauthorized access to systems using the compromised library.
    Supply chain attacks like this one highlight the vulnerabilities inherent in relying on third-party software components. The attack on CrowdStrike demonstrates how malicious actors can exploit these dependencies to infiltrate even well-protected environments. Continuous monitoring, timely updates, and robust security protocols are essential in mitigating the risks posed by such sophisticated cyber threats."

    • @thinkIndependent2024
      @thinkIndependent2024 3 місяці тому

      Nah !!! it was a software device driver that had access to the kernel

  • @kwaseng6939
    @kwaseng6939 3 місяці тому

    While BSOD, something that have been happening for a long long time.

    • @lab_cyber
      @lab_cyber  3 місяці тому

      Yes for almost 30 years now

  • @paolorivolta4087
    @paolorivolta4087 3 місяці тому

    Ok, but... what about pre-release test, especially on such important MS infrastructure?? If I were Microsoft, I asked in the Crowdstrike contract to do a pre-release check on an exact copy of my critical servers, before massive release.....😮
    Or I missed something?

    • @lab_cyber
      @lab_cyber  3 місяці тому +1

      No you didn't miss anything. I am sure CrowdStrike has a team for testing updates but I believe they messed up big time and didn't do their jobs properly.