{"id":45983,"date":"2024-07-24T13:00:08","date_gmt":"2024-07-24T17:00:08","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=45983"},"modified":"2024-07-24T13:00:08","modified_gmt":"2024-07-24T17:00:08","slug":"security-vendor-crowdstrike-issues-an-update-from-their-initial-post-incident-review","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/security-vendor-crowdstrike-issues-an-update-from-their-initial-post-incident-review\/","title":{"rendered":"Security vendor CrowdStrike issues an update from their initial Post Incident Review"},"content":{"rendered":"<p>Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company&#8217;s CEO has committed to being transparent regarding what the company learns about the causes of this disastrous incident.<\/p>\n<p>There has been a great deal of speculation that the cause of the issue was found in a kernel driver but the company says this is not the case. The cause, according to their report, was a template file containing data that resulted in an out-of-bounds memory read. This triggered an exception that Windows couldn\u2019t &#8220;handle elegantly&#8221;, causing the crash.<\/p>\n<p>Whether it was a driver or a template file is a bit of a moot point, especially since the files were stored in a folder called \\system32\\drivers\\CrowdStrike.<\/p>\n<p>The PIR also indicates that this template did indeed pass through an extensive testing process. The company notes that two other templates were issued that day without any issues.<\/p>\n<p>So why did their testing not catch this issue?\u00a0 Apparently, although the template passed through a number of stages of testing, none of these tested for bad data For that, there was a single point of failure in what they call the \u201cContent Validator.\u201d\u00a0 A bug in this validator allowed the template to pass through despite containing problematic data.<\/p>\n<p>Once the template was in place, it has to be deleted manually, although some quick thinking from CrowdStrike staff put the template on their &#8220;known bad&#8221; list which in some cases, in multiple reboots, would block the file and allow normal processes to resume.<\/p>\n<p>The company has outlined steps to prevent future incidents, including adding additional checks to the Content Validator and staggering deployment with a \u201ccanary\u201d approach so that future issues could caught before the update has spread to a large number of machines.<\/p>\n<p>Although this situation was identified and the offending template removed within a little over an hour of deployment, it still reached 8.5 million devices.<\/p>\n<p>With the update on their site, the company has provided a large number of resources, including a step-by-step video guide to help users fix the problem which can be found on their site.<\/p>\n<p>CrowdStrike assures customers that their systems&#8217; protection remains unaffected. They emphasized the importance of relying on official information sources and provided a step-by-step video guide to help users fix the problem.<\/p>\n<p><em>While we normally provide links to resources where appropriate, there are a number of what CrowdStrike CEO George Kurtz refers to as &#8220;adversaries and bad actors&#8221; who are trying to take advantage of this situation. Following a link in this case, even from a reliable source, is not a best practice. If you go to CrowdStrike.com you can easily find the additional information needed. Even in those cases, with a lot of &#8220;look-a-like&#8221; url&#8217;s being in circulation we urge careful typing.<\/em> &#8211; <em>Ed<\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company&#8217;s CEO has committed to being transparent regarding what the company learns about the causes of this disastrous incident. There has been a great deal of speculation that the cause of the issue was found in a kernel driver but [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":45984,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16,9,215],"tags":[1365,1295,275],"class_list":["post-45983","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-todays-news","category-top-stories","tag-todays-news","tag-top-stories","tag-top-story"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/45983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=45983"}],"version-history":[{"count":1,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/45983\/revisions"}],"predecessor-version":[{"id":45985,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/45983\/revisions\/45985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media\/45984"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=45983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=45983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=45983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}