this post was submitted on 21 Jul 2024
31 points (94.3% liked)

Technology

972 readers
43 users here now

A tech news sub for communists

founded 2 years ago
MODERATORS
 

(Archive Link)

Before a faulty software update dragged the company’s name into global headlines on Friday, Crowdstrike had a long history of involvement with US intelligence agencies, and played a key role in the ‘Russiagate’ hoax.

Crowdstrike released a defective update to its cloud-based security software on Friday that left an array of users around the world – including banks, airlines, media outlets, and government agencies – unable to use their IT systems.

The company issued a fix within several hours of the problem being identified, but thousands of flights remained canceled or delayed into Friday afternoon, while hospitals, police departments, and businesses continued to report issues getting back online.

[...]

Less than a year after Crowdstrike was founded, Kurtz and Alperovitch brought on board former FBI Executive Assistant Director Shawn Henry to head up its cybersecurity consultation wing. By 2014, Henry’s department was issuing a flurry of hacking and espionage accusations against China, Russia, and North Korea, with information provided by Crowdstrike helping the US Justice Department issue indictments that summer against five Chinese military officers who allegedly hacked US energy corporations.

[...]

Crowdstrike was hired by the US Democratic National Committee to investigate the theft of data from its servers in 2016. Published by WikiLeaks, the data revealed that the DNC had rigged the Democratic primary against Bernie Sanders, and that Hillary Clinton had effectively paid to control the committee.

Crowdstrike concluded that Russia was behind the breach, with Henry testifying to Congress that the company “saw activity that we believed was consistent with activity we’d seen previously and had associated with the Russian government.”

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 8 points 4 months ago (2 children)

I remember testing their software many years ago and asking myself, what the fuck does it actually do? There was no control. How do I scan and remove threats? It was just a fancy dashboard with bullshit metrics

[–] [email protected] 6 points 4 months ago

THERE IS NO WARRANTY THAT THE OFFERINGS OR CROWDSTRIKE TOOLS WILL BE ERROR FREE, OR THAT THEY WILL OPERATE WITHOUT INTERRUPTION OR WILL FULFILL ANY OF CUSTOMER’S PARTICULAR PURPOSES OR NEEDS. THE OFFERINGS AND CROWDSTRIKE TOOLS ARE NOT FAULT-TOLERANT AND ARE NOT DESIGNED OR INTENDED FOR USE IN ANY HAZARDOUS ENVIRONMENT REQUIRING FAIL-SAFE PERFORMANCE OR OPERATION. NEITHER THE OFFERINGS NOR CROWDSTRIKE TOOLS ARE FOR USE IN THE OPERATION OF AIRCRAFT NAVIGATION, NUCLEAR FACILITIES, COMMUNICATION SYSTEMS, WEAPONS SYSTEMS, DIRECT OR INDIRECT LIFE-SUPPORT SYSTEMS, AIR TRAFFIC CONTROL, OR ANY APPLICATION OR INSTALLATION WHERE FAILURE COULD RESULT IN DEATH, SEVERE PHYSICAL INJURY, OR PROPERTY DAMAGE

Point 8.6

Its also a funny thing. I mean, somehow thought: "its okay. They say not to use it in places where fault tolerance is important, but let's do it anyway".

[–] [email protected] 3 points 4 months ago

That was what I noticed too, and we just evaluated it and I couldn't see the utility in any of their stupid graphs. Why to I need to see this graph of the malware "moving laterally" when this graph is post facto... I'll already be infected with something. I don't need yet another way to run remote commands on my end points, I can just do it with powershell.

I don't call the shots ultimately, so whatever, but I was not impressed. Just age old signatures with paint and plaster covering it.

Honestly, Death to Microsoft.