This is an unpopular opinion, and I get why – people crave a scapegoat. CrowdStrike undeniably pushed a faulty update demanding a low-level fix (booting into recovery). However, this incident lays bare the fragility of corporate IT, particularly for companies entrusted with vast amounts of sensitive personal information.

Robust disaster recovery plans, including automated processes to remotely reboot and remediate thousands of machines, aren’t revolutionary. They’re basic hygiene, especially when considering the potential consequences of a breach. Yet, this incident highlights a systemic failure across many organizations. While CrowdStrike erred, the real culprit is a culture of shortcuts and misplaced priorities within corporate IT.

Too often, companies throw millions at vendor contracts, lured by flashy promises and neglecting the due diligence necessary to ensure those solutions truly fit their needs. This is exacerbated by a corporate culture where CEOs, vice presidents, and managers are often more easily swayed by vendor kickbacks, gifts, and lavish trips than by investing in innovative ideas with measurable outcomes.

This misguided approach not only results in bloated IT budgets but also leaves companies vulnerable to precisely the kind of disruptions caused by the CrowdStrike incident. When decision-makers prioritize personal gain over the long-term health and security of their IT infrastructure, it’s ultimately the customers and their data that suffer.

  • breakingcups@lemmy.world
    link
    fedilink
    English
    arrow-up
    178
    arrow-down
    6
    ·
    5 months ago

    Please, enlighten me how you’d remotely service a few thousand Bitlocker-locked machines, that won’t boot far enough to get an internet connection, with non-tech-savvy users behind them. Pray tell what common “basic hygiene” practices would’ve helped, especially with Crowdstrike reportedly ignoring and bypassing the rollout policies set by their customers.

    Not saying the rest of your post is wrong, but this stood out as easily glossed over.

    • ramble81@lemm.ee
      link
      fedilink
      English
      arrow-up
      38
      arrow-down
      2
      ·
      5 months ago

      You’d have to have something even lower level like a OOB KVM on every workstation which would be stupid expensive for the ROI, or something at the UEFI layer that could potentially introduce more security holes.

      • Leeks@lemmy.world
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        3
        ·
        5 months ago

        Maybe they should offer a real time patcher for the security vulnerabilities in the OOB KVM, I know a great vulnerability database offered by a company that does this for a lot of systems world wide! /s

        • A_A@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          2
          ·
          5 months ago

          Lol 😋 ! also i need a “Out-of-Band, Keyboard, Video, and Mouse” to your “OOB, KVM” so to steal the bank improve security.

      • circuscritic
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        2
        ·
        edit-2
        5 months ago

        …you don’t have OOBM on every single networked device and terminal? Have you never heard of the buddy system?

        You should probably start writing up an RFP. I’d suggest you also consider doubling up on the company issued phones per user.

        If they already have an ATT phone, get them a Verizon one as well, or vice versa.

        At my company we’re already way past that. We’re actually starting to import workers to provide human OOBM.

        You don’t answer my call? I’ll just text the migrant worker we chained to your leg to flick your ear until you pick up.

        Maybe that sounds extreme, but guess who’s company wasn’t impacted by the Crowdstrike outage.

        • ToyDork@preserve.games
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 months ago

          I mean, with the exception of the shackles, this is just logistics 101. The more something needs to stay working or not accidentally trigger a huge problem, the more resources you dedicate to picking up where the regular guy left off because the “fleffingbridge transport 1” company’s bus broke down in front of the regular guy and his bus got hit by a train. Solution? New bus, plant some trees. Prevention? Bridges and tunnels aren’t cheap, but clearly we need one there now. We can’t predict the future but we have to do our best to try or - simulated or real - the cost will be paid in blood. Obviously there’s moral limits, but hiring more staff is not in and of itself immoral nor the wrong approach.

          If I was in charge of a real life logistics operation, I’d be devastated if anyone died because of me. I can’t say, however, that it can be avoided. Sometimes people die at random, that’s not yet 100% avoidable and might never be, but I do care. I’d hope people who actually end up in logistics could learn to indulge their empathy enough to remember there are lives on the line, but I can’t blame someone for being bitter that the actual work output is purely being fleeced for profit.

        • ramble81@lemm.ee
          link
          fedilink
          English
          arrow-up
          9
          ·
          5 months ago

          I didn’t say it was, nor did I say UEFI was the problem. My point was additional applications or extensions at the UEFI layer increase the attack footprint of a system. Just like vPro, you’re giving hackers a method that can compromise a system below the OS. And add that in to laptops and computers that get plugged in random places before VPNs and other security software is loaded and you have a nice recipe for hidden spyware and such.

    • Howdy@lemmy.zip
      link
      fedilink
      English
      arrow-up
      28
      ·
      edit-2
      5 months ago

      Was a windows sysadmin for a decade. We had thousands of machines with endpoint management with bitlocker encryption. (I have sincd moved on to more of into cloud kubertlnetes devops) Anything on a remote endpoint doesn’t have any basic “hygiene” solution that could remotely fix this mess automatically. I guess Intels bios remote connection (forget the name) could in theory allow at least some poor tech to remote in given there is internet connection and the company paid the xhorbant price.

      All that to say, anything with end-user machines that don’t allow it to boot is a nightmare. And since bit locker it’s even more complicated. (Hope your bitloxker key synced… Lol).

      • Spuddlesv2
        link
        fedilink
        English
        arrow-up
        22
        arrow-down
        2
        ·
        5 months ago

        You’re thinking of Intel vPro. I imagine some of the Crowdstrike victims customers have this and a bunch of poor level 1 techs are slowly griding their way through every workstation on their networks. But yeah, OP is deluded and/or very inexperienced if they think this could have been mitigated on workstations through some magical “hygiene”.

      • LrdThndr@lemmy.world
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        5
        ·
        5 months ago

        Bro. PXE boot image servers. You can remotely image machines from hundreds of miles away with a few clicks and all it takes on the other end is a reboot.

        • wizardbeard@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          1
          ·
          5 months ago

          With a few clicks and being connected to the company network. Leaving anyone not able to reach an office location SOL.

          • LrdThndr@lemmy.world
            link
            fedilink
            English
            arrow-up
            5
            arrow-down
            1
            ·
            5 months ago

            Hey, it’s not perfect, but a fix that gets you 10% of the way there is still 10% you don’t have to do by hand. Don’t let perfect be the enemy of good, my man.

    • LrdThndr@lemmy.world
      link
      fedilink
      English
      arrow-up
      30
      arrow-down
      8
      ·
      edit-2
      5 months ago

      A decade ago I worked for a regional chain of gyms with locations in 4 states.

      I was in TN. When a system would go down in SC or NC, we originally had three options:

      1. (The most common) have them put it in a box and ship it to me.
      2. I go there and fix it (rare)
      3. I walk them through fixing it over the phone (fuck my life)

      I got sick of this. So I researched options and found an open source software solution called FOG. I ran a server in our office and had little optiplex 160s running a software client that I shipped to each club. Then each machine at each club was configured to PXE boot from the fog client.

      The server contained images of every machine we commonly used. I could tell FOG which locations used which models, and it would keep the images cached on the client machines.

      If everything was okay, it would chain the boot to the os on the machine. But I could flag a machine for reimage and at next boot, the machine would check in with the local FOG client via PXE and get a complete reimage from premade images on the fog server.

      The corporate office was physically connected to one of the clubs, so I trialed the software at our adjacent club, and when it worked great, I rolled it out company wide. It was a massive success.

      So yes, I could completely reimage a computer from hundreds of miles away by clicking a few checkboxes on my computer. Since it ran in PXE, the condition of the os didn’t matter at all. It never loaded the os when it was flagged for reimage. It would even join the computer to the domain and set up that locations printers and everything. All I had to tell the low-tech gymbro sales guy on the phone to do was reboot it.

      This was free software. It saved us thousands in shipping fees alone. And brought our time to fix down from days to minutes.

      There ARE options out there.

      • magikmw@lemm.ee
        link
        fedilink
        English
        arrow-up
        26
        ·
        edit-2
        5 months ago

        This works great for stationary pcs and local servers, does nothing for public internet connected laptops in hands of users.

        The only fix here is staggered and tested updates, and apparently this update bypassed even deffered update settings that crowdstrike themselves put into their software.

        The only winning move here was to not use crowdstrike.

        • wizardbeard@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          9
          arrow-down
          2
          ·
          5 months ago

          It also assumes that reimaging is always an option.

          Yes, every company should have networked storage enforced specifically for issues like this, so no user data would be lost, but there’s often a gap between should and “has been able to find the time and get the required business side buy in to make it happen”.

          Also, users constantly find new ways to do non-standard, non-supported things with business critical data.

          • Bluetreefrog@lemmy.world
            link
            fedilink
            English
            arrow-up
            5
            ·
            5 months ago

            Isn’t this just more of what caused the problem in the first place? Namely, centralisation. If you store data locally and you lose a machine, that’s bad but not the end of the world. If you store it centrally and you lose the data, that’s catastrophic. Nassim Taleb nailed this stuff. Keep the downside limited, and the upside unlimited or as he says, “Don’t pick up pennies in front of a steamroller.”

        • LrdThndr@lemmy.world
          link
          fedilink
          English
          arrow-up
          8
          arrow-down
          2
          ·
          5 months ago

          Absolutely. 100%

          But don’t let perfect be the enemy of good. A fix that gets you 40% of the way there is still 40% less work you have to do by hand. Not everything has to be a fix for all situations. There’s no such thing as a panacea.

          • magikmw@lemm.ee
            link
            fedilink
            English
            arrow-up
            6
            ·
            5 months ago

            Sure. At the same time one needs to manage resources.

            I was all in on laptop deployment automation. It cut down on a lot of human error issues and having inconsistent configuration popping up all the time.

            But it needs constant supervision, even if not constant updates. More systems and solutions lead to neglect if not supplied well. So some “would be good to have” systems just never make the cut, because as overachieving I am, I’m also don’t want to think everything is taken care of when it clearly isn’t.

            • catloaf@lemm.ee
              link
              fedilink
              English
              arrow-up
              2
              ·
              5 months ago

              Yeah. I find a base image and post-install config with group policy or Ansible to be far more reliable.

              • magikmw@lemm.ee
                link
                fedilink
                English
                arrow-up
                1
                ·
                5 months ago

                Yea we’re doing something similiar. Only update base images for bigger OS updates or if something breaks or can break.

                The general idea is to have config that works for both new PCs and the ones that are already in use. Saves on maintaining two configuration methods.

            • John Richard@lemmy.worldOP
              link
              fedilink
              English
              arrow-up
              4
              arrow-down
              3
              ·
              5 months ago

              You were all in, but was the company all in? How many employees? It sounds like you innovated. Let’s say that the company you worked for was spending millions on vendors that promised solutions but rarely delivered. If instead they gave you $400k a year, a $1 million/year budget & 10 employees… I’m guessing you could have managed the laptop deployment automation, along with some other significant projects as well.

              Instead though, people with good ideas, even loyal to the company, are competing against sales and marketing reps from billion dollar companies, and upper management are easily swooned.

              • magikmw@lemm.ee
                link
                fedilink
                English
                arrow-up
                3
                ·
                5 months ago

                I’m the only one to swoon here, and I’m as sceptical as one can be.

                I’m also a cost and my budget is on paper only. Non-IT management is complicit in crappy IT.

        • John Richard@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          7
          ·
          5 months ago

          Almost all computers can be set to PXE boot, but work laptops usually even have more advanced remote management capabilities. You ask the employee to reboot the laptop and presto!

          • magikmw@lemm.ee
            link
            fedilink
            English
            arrow-up
            7
            ·
            5 months ago

            I wonder how you’re supposed to get PXE boot to work securely over the internet. And how that helps when affected disk is still encrypted and needs unusual intervention to fix, including admin access to system files.

            I’ve been doing this for a while, and I like creative solutions, so I wonder about those issues a lot. Not much comes to my mind besides let’s recall all the laptops and do it one by one.

            • wizardbeard@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              1
              ·
              edit-2
              5 months ago

              Hypothectically you could ship a company provided router to handle the vpn connection to your remote users, so you aren’t relying on the OS to be able to boot up to get connected to the vpn for the company network and PXE environment. Lots of extra cost and mess though.

            • LrdThndr@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              5 months ago

              From a home user? Probably ain’t shit-all you can do with PXE booting. But if you have a field office or somewhere a user can go with a hardware vpn appliance? Well now you’re in business.

            • John Richard@lemmy.worldOP
              link
              fedilink
              English
              arrow-up
              3
              arrow-down
              4
              ·
              5 months ago

              I wonder how you’re supposed to get PXE boot to work securely over the internet.

              PXE boot is more of last resort IMO, but can be uses as a chainloader to a more secure option. The biggest challenge I could see security-wise is having PXE boot being ran on unsecured networks. Even then though, normally a computer will have been provisioned on a secure network and will have encryption and secure boot-based encryption, and some additional signature-based image verification.

      • yeehaw
        link
        fedilink
        English
        arrow-up
        5
        ·
        5 months ago

        This is a good solution for these types of scenarios. Doesn’t fit all though. Where I work, 85% of staff work from home. We largely use SaaS. I’m struggling to think of a good method here other than walking them through reinstalling windows on all their machines.

        • LrdThndr@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          5 months ago

          That’s still 15% less work though. If I had to manually fix 1000 computers, clicking a few buttons to automatically fix 150 of them sounds like a sweet-ass deal to me even if it’s not universal.

          You could also always commandeer a conference room or three and throw a switch on the table. “Bring in your laptop and go to conference room 3. Plug in using any available cable on the table and reboot your computer. Should be ready in an hour or so. There’s donuts and coffee in conference room 4.” Could knock out another few dozen.

          Won’t help for people across the country, but if they’re nearish, it’s not too bad.

          • yeehaw
            link
            fedilink
            English
            arrow-up
            2
            ·
            5 months ago

            Not a lot of nearish. It would be pretty bad if this happened here.

        • John Richard@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          6
          ·
          edit-2
          5 months ago
          1. Configure PXE to reboot into recovery image, push out command to remove bad file. Reboot. Done. Workstation laptops usually have remote management already.

          or

          1. Have recovery image already installed. Have user reboot & push key to boot into recovery. Push out fix. Done.
          • yeehaw
            link
            fedilink
            English
            arrow-up
            3
            ·
            5 months ago

            I had no idea you could remotely configure pxe to reboot into a recovery image and run a script. How do you do this?

          • LrdThndr@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            edit-2
            5 months ago

            Fuck yeah. Even better than reimage. That’s creative as fuck and I love it.

        • LrdThndr@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          5 months ago

          How would it not have? You got an office or field offices?

          “Bring your computer by and plug it in over there.” And flag it for reimage. Yeah. It’s gonna be slow, since you have 200 of the damn things running at once, but you really want to go and manually touch every computer in your org?

          The damn thing’s even boot looping, so you don’t even have to reboot it.

          I’m sure the user saved all their data in one drive like they were supposed to, right?

          I get it, it’s not a 100% fix rate. And it’s a bit of a callous answer to their data. And I don’t even know if the project is still being maintained.

          But the post I replied to was lamenting the lack of an option to remotely fix unbootable machines. This was an option to remotely fix nonbootable machines. No need to be a jerk about it.

          But to actually answer your question and be transparent, I’ve been doing Linux devops for 10 years now. I haven’t touched a windows server since the days of the gymbros. I DID say it’s been a decade.

          • Brkdncr@lemmy.world
            link
            fedilink
            English
            arrow-up
            8
            arrow-down
            4
            ·
            5 months ago

            Because your imaging environment would also be down. And you’re still touching each machine and bringing users into the office.

            Or your imaging process over the wan takes 3 hours since it’s dynamically installing apps and updates and not a static “gold” image. Imaging is then even slower because your source disk is only ssd and imaging slows down once you get 10+ going at once.

            I’m being rude because I see a lot of armchair sysadmins that don’t seem to understand the scale of the crowdstike outage, what crowdstrike even is beyond antivirus, and the workflow needed to recover from it.

            • LrdThndr@lemmy.world
              link
              fedilink
              English
              arrow-up
              6
              ·
              5 months ago

              FOG ran on Linux. It wouldn’t have been down. But that’s beside the point.

              I never said it was a good answer to CrowdStrike. It was just a story about how I did things 10 years ago, and an option for remotely fixing nonbooting machines. That’s it.

              I get you’ve been overworked and stressed as fuck this last few days. I’ve been out of corporate IT for 10 years and I do not envy the shit you guys are going through right now. I wish I could buy you a cup of coffee or a beer or something.

              • Brkdncr@lemmy.world
                link
                fedilink
                English
                arrow-up
                3
                ·
                5 months ago

                Last time I used fog it was only doing static image deployment which has been out of style for a while. I don’t know if there are any serious deployment products for windows enterprise that don’t run on windows.

                I’m personally not dealing with this because I didn’t like how Crowdstrike had answered a number of questions in their sales call.

                Avoiding telling me their vuln scan doesn’t prob be all hosts after claiming it could replace a real vuln scanner, claiming they are somehow better than others at malware detection without bringing up 3rd party tests, claiming how their product was novel when others have been doing the same for 7+ years.

                My fave was them telling me how much easier it is to manage but no one on the call had ever worked as a sysadmin or even seen how their competition works.

                Shitshow. I’m so glad this happened so I can block their sales team.

            • John Richard@lemmy.worldOP
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              4
              ·
              5 months ago

              Imaging environment down? If a sysadmin can’t figure out how to boot a machine into recovery to remove the bad update file then they have bigger problems. The fix in this instance wasn’t even re-imaging machines. It was merely removing a file. Ideal DR scenario would have a recovery image already on the system that can be booted into remotely, so there is minimal strain on the network. Furthermore, we don’t live in dial-up age anymore.

              • Brkdncr@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                ·
                5 months ago

                Imaging environment would be bitlocker’d with its key stuck in AD which is also bitlocker’d.

      • John Richard@lemmy.worldOP
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        5
        ·
        5 months ago

        Thank you for sharing this. This is what I’m talking about. Larger companies not utilizing something like this already are dysfunctional. There are no excuses for why it would take them days, weeks or longer.

    • Dran@lemmy.world
      link
      fedilink
      English
      arrow-up
      17
      arrow-down
      2
      ·
      edit-2
      5 months ago

      Separate persistent data and operating system partitions, ensure that every local network has small pxe servers, vpned (wireguard, etc) to a cdn with your base OS deployment images, that validate images based on CA and checksum before delivering, and give every user the ability to pxe boot and redeploy the non-data partition.

      Bitlocker keys for the OS partition are irrelevant because nothing of value is stored on the OS partition, and keys for the data partition can be stored and passed via AD after the redeploy. If someone somehow deploys an image that isn’t ours, it won’t have keys to the data partition because it won’t have a trust relationship with AD.

      (This is actually what I do at work)

      • I_Miss_Daniel@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        5 months ago

        Sounds good, but can you trust an OS partition not to store things in %programdata% etc that should be encrypted?

        • Dran@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          2
          ·
          5 months ago

          With enough autism in your overlay configs, sure, but in my environment tat leakage is still encrypted. It’s far simpler to just accept leakage and encrypt the OS partition with a key that’s never stored anywhere. If it gets lost, you rebuild the system from pxe. (Which is fine, because it only takes about 20 minutes and no data we care about exists there) If it’s working correctly, the OS partition is still encrypted and protects any inadvertent data leakage from offline attacks.

      • Trainguyrom@reddthat.com
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        5 months ago

        Separate persistent data and operating system partitions, ensure that every local network has small pxe servers, vpned (wireguard, etc) to a cdn with your base OS deployment images, that validate images based on CA and checksum before delivering, and give every user the ability to pxe boot and redeploy the non-data partition.

        At that point why not just redirect the data partition to a network share with local caching? Seems like it would simplify this setup greatly (plus makes enabling shadow copy for all users stupid easy)

        Edit to add: I worked at a bank that did this for all of our users and it was extremely convenient for termed employees since we could simply give access to the termed employee’s share to their manager and toss a them a shortcut to access said employee’s files, so if it turned out Janet had some business critical spreadsheet it was easily accessible even after she was termed

        • Dran@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          5 months ago

          We do this in a lot of areas with fslogix where there is heavy persistent data, it just never felt necessary to do that for endpoints where the persistent data partition is not much more than user settings and caches of convenience. Anything that is important is never stored solely on the endpoints, but it is nice to be able to reboot those servers without affecting downstream endpoints. If we had everything locally dependant on fslogix, I’d have to schedule building-wide outages for patching.

      • Brkdncr@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        2
        ·
        5 months ago

        But your pxe boot server is down, your radius server providing vpn auth is down, your bitlocker keys are in AD which is down because all your domain controllers are down.

        • Dran@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          1
          ·
          5 months ago

          Yes and no. In the best case, endpoints have enough cached data to get us through that process. In the worst case, that’s still a considerably smaller footprint to fix by hand before the rest of the infrastructure can fix itself.

      • pHr34kY@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 months ago

        I’ve been separating OS and data partitions since I was a kid running Windows 95. It’s horrifying that people don’t expect and prepare for machines to become unbootable on a regular basis.

        Hell, I bricked my work PC twice this year just by using the Windows cleanup tool - on Windows 11. The antivirus went nuclear, as antivirus products do.

    • felbane@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      1
      ·
      5 months ago

      Rollout policies are the answer, and CrowdStrike should be made an example of if they were truly overriding policies set by the customer.

      It seems more likely to me that nobody was expecting “fingerprint update” to have the potential to completely brick a device, and so none of the affected IT departments were setting staged rollout policies in the first place. Or if they were, they weren’t adequately testing.

      Then - after the fact - it’s easy to claim that rollout policies were ignored when there’s no way to prove it.

      If there’s some evidence that CS was indeed bypassing policies to force their updates I’ll eat the egg on my face.

      • originalucifer@moist.catsweat.com
        link
        fedilink
        arrow-up
        8
        arrow-down
        1
        ·
        edit-2
        5 months ago

        from what ive read/watched thats the crux of the issue… did they push a ‘content’ update, i.e. signatures or did they push a code update.

        so you basically had a bunch of companies who absolutely do test all vendor code updates beings slipped a code update they werent aware of being labeled a ‘content’ update.

      • DesertCreosote@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 months ago

        I’m one of the admins who manage CrowdStrike at my company.

        We have all automatic updates disabled, because when they were enabled (according to the CrowdStrike best practices guide they gave us), they pushed out a version with a bug that overwhelmed our domain servers. Now we test everything through multiple environments before things make it to production, with at least two weeks of testing before we move a version to the next environment.

        This was a channel file update, and per our TAM and account managers in our meeting after this happened, there’s no way to stop that file from being pushed, or to delay it. Supposedly they’ll be adding that functionality in now.

    • sp3ctr4l@lemmy.zip
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      1
      ·
      edit-2
      5 months ago

      You are talking about how to fix the problem.

      This person is talking about what caused the problem.

      Completely different things.

      1. Bad thing happened, how do we fix bad thing and its effects.

      Analogous to: A house is on fire; call the ambulances to treat any wounded call the fire department, call insurance, figure out temporary housing.

      This is basically immediate remedy or mitigation.

      1. Bad thing happened, but why did the bad thing happen and how to we prevent future occurrences of this?

      Analogous to: Investigate the causes of the fire, suggest various safety regulations on natural gas infrastructure, home appliances, electrical wiring, building material and methods, etc.

      This is much more complex and involves systemic change.

    • lazynooblet@lazysoci.al
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      2
      ·
      5 months ago

      Autopilot, intune. Force restart device twice to get startup repair, choose factory reset, share LAPS admin password and let the workstation rebuild itself.

    • JasonDJ@lemmy.zip
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      5 months ago

      Does Windows have a solid native way to remotely re-image a system like macOS does?

      • catloaf@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        4
        ·
        5 months ago

        No.

        Maybe with Intune and Autopilot, but I haven’t used it.

        • John Richard@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          3
          ·
          5 months ago

          Windows ADK does this too, or any PXE server really… so yes, you can. The CS issue though didn’t require re-image. Merely removing a file. DR planning would usually have a recovery image pre-installed to automate booting into for lower-level fixes.

    • Saik0@lemmy.saik0.com
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      5 months ago

      Please, enlighten me how you’d remotely service a few thousand Bitlocker-locked machines, that won’t boot far enough to get an internet connection,

      Intel AMT.

    • nomad@infosec.pub
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      2
      ·
      edit-2
      5 months ago

      It’s called EFI. How do you think your BIOS update from inside BIOS is working? ;)

      EDIT: oh, and PXE boot + wol.

    • Riskable@programming.dev
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      4
      ·
      edit-2
      5 months ago

      what common “basic hygiene” practices would’ve helped

      Not using a proprietary, unvetted, auto-updating, 3rd party kernel module in essential systems would be a good start.

      Back in the day companies used to insist upon access to the source code for such things along with regular 3rd party code audits but these days companies are cheap and lazy and don’t care as much. They’d rather just invest in “security incident insurance” and hope for the best 🤷

      Sometimes they don’t even go that far and instead just insist upon useless indemnification clauses in software licenses. …and yes, they’re useless:

      https://www.nolo.com/legal-encyclopedia/indemnification-provisions-contracts.html#:~:text=Courts have commonly held that,knowledge of the relevant circumstances).

      (Important part indicating why they’re useless should be highlighted)

    • SuperFola@programming.dev
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      2
      ·
      5 months ago

      Dual partitioning as Android does it might have helped. Install the update to partition B, reboot and if it’s alright swap A and B partitions to make B the default. Boot again to the default partition (A, formerly B).

      It wouldn’t have booted correctly afaiu with the faulty update, and would have been reverted to use the untouched A partition.

    • John Richard@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      4
      ·
      5 months ago

      I’d issue IPMI or remote management commands to reboot the machines. Then I’d boot into either a Linux recovery environment (yes, Linux can unlock BitLocker-encrypted drives) or a WinPE (or Windows RE) and unlock the drives, preferably already loaded on the drives, but could have them PXE boot - just giving ideas here, but ideal DR scenario would have an environment ready to load & PXE would cause delays.

      I’d either push a command or script that would then remove the update file that caused the issue & then reboots. Having planned for a scenario like this already, total time to fix would be less than 2 hours.

      • Riskable@programming.dev
        link
        fedilink
        English
        arrow-up
        3
        ·
        5 months ago

        At my company I use a virtual desktop and it was restored from a nightly snapshot a few hours before I logged in that day (and presumably, they also applied a post-restore temp fix). This action was performed on all the virtual desktops at the entire company and took approximately 30 minutes (though, probably like 4 hours to get the approval to run that command, LOL).

        It all took place before I even logged in that day. I was actually kind of impressed… We don’t usually act that fast.

  • Leeks@lemmy.world
    link
    fedilink
    English
    arrow-up
    66
    arrow-down
    1
    ·
    5 months ago

    bloated IT budgets

    Can you point me to one of these companies?

    In general IT is run as a “cost center” which means they have to scratch and save everywhere they can. Every IT department I have seen is under staffed and spread too thin. Also, since it is viewed as a cost, getting all teams to sit down and make DR plans (since these involve the entire company, not just IT) is near impossible since “we may spend a lot of time and money on a plan we never need”.

    • John Richard@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      23
      ·
      5 months ago

      With most corporations, especially Fortune 500s… audit their budgets. The problem doesn’t start with IT. but with bad management from top down. This “cost center” you speak of is mostly what I’d expect to hear do-nothing middle-level managers tell their in-house employees when asking for a raise.

      • Leeks@lemmy.world
        link
        fedilink
        English
        arrow-up
        22
        ·
        5 months ago

        It feels like you have an agenda that you are trying to apply to the CrowdStrike event and just so happen to slandering IT as an innocent bystander to the agenda you are putting forward.

        If you had to summarize the goal of your initial post in less then 10 words, what would it be?

          • Leeks@lemmy.world
            link
            fedilink
            English
            arrow-up
            7
            ·
            5 months ago

            Thanks for responding in good faith!

            I agree that while CS did screw up in pushing out a bad update, only having a single vendor for a critical process that can take the whole business down is equally a screw up. Ideally companies should have had CS installed on half the systems and a secondary malware prevention system on every DR and “redundant” system. Having all of a company’s eggs in a single basket is very bad.

            All the above being said; to properly implement a fully redundant, to the vendor level, system would require either double the support team, or a massive development effort to tie the management of the systems together. Either way, that is going to be very expensive. The point being: Reducing the budget of IT departments will further cause the consolidation of vendors and increase the number of vendor caused complete outage events.

  • technocrit@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    47
    ·
    edit-2
    5 months ago

    An underlying problem is that legal security is mostly security theatre. Legal security provides legal cover for entities without much actual security.

    The point of legal security is not to protect privacy, users, etc., but to protect the liability of legal entities when the inevitable happens.

    neglecting the due diligence necessary to ensure those solutions truly fit their needs.

    CrowdStrike perfectly met their needs by proving someone else to blame. I don’t think anybody is facing any consequences for contracting with CrowdStrike. It’s the same deal with Microsoft X 10000000. These bad incentives are the whole point of the system.

    • Kalkaline @leminal.space
      link
      fedilink
      English
      arrow-up
      15
      ·
      5 months ago

      The crazy thing is CrowdStrike basically shutdown a ton of really important things and their stock only went down 17%. Like it was a huge blow to the economy for a couple days and somehow investors were like “meh, not that bad”

    • Riskable@programming.dev
      link
      fedilink
      English
      arrow-up
      16
      arrow-down
      2
      ·
      5 months ago

      I don’t think anybody is facing any consequences for contracting with CrowdStrike.

      This is the myth! As we all know there were very serious consequences as a result of this event. End users, customers, downstream companies, entire governments, etc were all severely impacted and they don’t give a shit that it was Crowdstrike’s mistake that caused the outages.

      From their perspective it was the companies that had the upstream outages that caused the problem. The vendor behind the underlying problem is irrelevant. When your plan is to point the proverbial finger at some 3rd party you chose that finger still–100% always–points to yourself.

      When the CEO of Baxter International testified before Congress to try to explain why people died from using tainted Heparin he tried to hand wave it away, “it was the Chinese supplier that caused this!” Did everyone just say, “oh, then that’s understandable!” Fuck no.

      Baxter chose that Chinese supplier and didn’t test their goods. They didn’t do due diligence. Baxter International fucked up royally, not the Chinese vendor! The Chinese vendor scammed them for sure but it was Baxter International’s responsibility to ensure the drug was, well, the actual drug and not something else or contaminated.

      Reference: https://en.wikipedia.org/wiki/2008_Chinese_heparin_adulteration

      • maniii@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        1
        ·
        5 months ago

        I would think that a FDA-ban on Chinese pharmaceuticals and an international arrest warrant for the Chinese suppliers C-suite should have been effected.

        The fact that the US company CEO was liable and probably didnt spend a single day in a real prison cell is more likely outcome.

  • kent_eh
    link
    fedilink
    English
    arrow-up
    45
    arrow-down
    1
    ·
    5 months ago

    Bloated IT budgets?

    Where do you work, and are they hiring?

    • irotsoma@lemmy.world
      link
      fedilink
      English
      arrow-up
      18
      ·
      5 months ago

      The bloat isn’t for workers, otherwise there’d be enough people to go reboot the machines and fix the issue manually in a reasonable amount of time. It’s only for executives, managers, and contracts with kickbacks. In fact usually they buy software because it promises to cut the need for people and becomes an excuse for laying off or eliminating new hire positions.

    • GiveMemes@jlai.lu
      link
      fedilink
      English
      arrow-up
      14
      ·
      5 months ago

      As the post was stating, they get bloated by relying on vendors rather than in-house IT/Security.

      My grandfather works IT for my state government tho and it’s a pretty good gig according to him

  • TechNerdWizard42@lemmy.world
    link
    fedilink
    English
    arrow-up
    28
    arrow-down
    8
    ·
    5 months ago

    Issue is definitely corporate greed outsourcing issues to a mega monolith IT company.

    Most IT departments are idiots now. Even 15 years ago, those were the smartest nerds in most buildings. They had to know how to do it all. Now it’s just installing the corporate overlord software and the bullshit spyware. When something goes wrong, you call the vendor’s support line. That’s not IT, you’ve just outsourced all your brains to a monolith that can go at any time.

    None of my servers running windows went down. None of my infrastructure. None of the infrastructure I manage as side hustles.

    • ocassionallyaduck@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      5 months ago

      Man, as someone who’s cross discipline in my former companies, the way people treat It, and the way the company considers IT as an afterthought is just insane. The technical debt is piled high.

    • Lettuce eat lettuce@lemmy.ml
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      5 months ago

      I’ve seen the same thing. IT departments are less and less interested in building and maintaining in-house solutions.

      I get why, it requires more time, effort, money, and experienced staff to pay.

      But you gain more robust systems when it’s done well. Companies want to cut costs everywhere they can, and it’s cheaper to just pay an outside company to do XY&Z for you and just hire an MSP to manage your web portals for it, or maybe a 2-3 internal sys admins that are expected to do all that plus level 1 help desk support.

      Same thing has happened with end users. We spent so much time trying to make computers “friendly” to people, that we actually just made people computer illiterate.

      I find myself in a strange place where I am having to help Boomers, older Gen-X, and Gen-Z with incredibly basic computer functions.

      Things like:

      • Changing their passwords when the policy requires it.
      • Showing people where the Start menu is and how to search for programs there.
      • How to pin a shortcut to their task bar.
      • How to snap windows to half the screen.
      • How to un-mute their volume.
      • How to change their audio device in Teams or Zoom from their speakers to their headphones.
      • How to log out of their account and log back in.
      • How to move files between folders.
      • How to download attachments from emails.
      • How to attach files in an email.
      • How to create and organize Browser shortcuts.
      • How to open a hyperlink in a document.
      • How to play an audio or video file in an email.
      • How to expand a basic folder structure in a file tree.
      • How to press buttons on their desk phone to hear voicemails.

      It’s like only older Millennials and younger gen-X seem to have a general understanding of basic computer usage.

      Much of this stuff has been the same for literally 30+ years. The Start menu, folders, voicemail, email, hyperlinks, browser bookmarks, etc. The coat of paint changes every 5-7 years, but almost all the same principles are identical.

      Can you imagine people not knowing how to put a car in drive, turn on the windshield wipers, or fill it with petrol, just because every 5-7 years the body style changes a little?

  • r00ty@kbin.life
    link
    fedilink
    arrow-up
    19
    arrow-down
    1
    ·
    5 months ago

    I think it’s most likely a little of both. It seems like the fact most systems failed at around the same time suggests that this was the default automatic upgrade /deployment option.

    So, for sure the default option should have had upgrades staggered within an organisation. But at the same time organisations should have been ensuring they aren’t upgrading everything at once.

    As it is, the way the upgrade was deployed made the software a single point of failure that completely negated redundancies and in many cases hobbled disaster recovery plans.

    • DesertCreosote@lemm.ee
      link
      fedilink
      English
      arrow-up
      25
      ·
      5 months ago

      Speaking as someone who manages CrowdStrike in my company, we do stagger updates and turn off all the automatic things we can.

      This channel file update wasn’t something we can turn off or control. It’s handled by CrowdStrike themselves, and we confirmed that in discussions with our TAM and account manager at CrowdStrike while we were working on remediation.

      • r00ty@kbin.life
        link
        fedilink
        arrow-up
        6
        ·
        5 months ago

        That’s interesting. We use crowdstrike, but I’m not in IT so don’t know about the configuration. Is a channel file, somehow similar to AV definitions? That would make sense, and I guess means this was a bug in the crowdstrike code in parsing the file somehow?

        • DesertCreosote@lemm.ee
          link
          fedilink
          English
          arrow-up
          8
          ·
          5 months ago

          Yes, CrowdStrike says they don’t need to do conventional AV definitions updates, but the channel file updates sure seem similar to me.

          The file they pushed out consisted of all zeroes, which somehow corrupted their agent and caused the BSOD. I wasn’t on the meeting where they explained how this happened to my company; I was one of the people woken up to deal with the initial issue, and they explained this later to the rest of my team and our leadership while I was catching up on missed sleep.

          I would have expected their agent to ignore invalid updates, which would have prevented this whole thing, but this isn’t the first time I’ve seen examples of bad QA and/or their engineering making assumptions about how things will work. For the amount of money they charge, their product is frustratingly incomplete. And asking them to fix things results in them asking you to submit your request to their Ideas Portal, so the entire world can vote on whether it’s a good idea, and if enough people vote for it they will “consider” doing it. My company spends a fortune on their tool every year, and we haven’t been able to even get them to allow non-case-sensitive searching, or searching for a list of hosts instead of individuals.

          • r00ty@kbin.life
            link
            fedilink
            arrow-up
            3
            ·
            5 months ago

            Thanks. That explains a lot of what I didn’t think was right regarding the almost simultaneous failures.

            I don’t write kernel code at all for a living. But, I do understand the rationale behind it, and it seems to me this doesn’t fit that expectation. Now, it’s a lot of hypothetical. But if I were writing this software, any processing of these files would happen in userspace. This would mean that any rejection of bad/badly formatted data, or indeed if it managed to crash the processor it would just be an app crash.

            The general rule I’ve always heard is that you want to keep the minimum required work in the kernel code. So I think processing/rejection should have been happening in userspace (and perhaps even using code written in a higher level language with better memory protections etc) and then a parsed and validated set of data would be passed to the kernel code for actioning.

            But, I admit I’m observing from the outside, and it could be nothing like this. But, on the face of it, it does seem to me like they were processing too much in the kernel code.

      • daddy32@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        5 months ago

        There was a “hack” mentioned in another thread - you can block it via firewall and then selectively open it.

  • Boozilla@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    ·
    5 months ago

    I’ve worked in various and sundry IT jobs for over 35 years. In every job, they paid a lot of lip service and performed a lot box-checking towards cybersecurity, disaster recovery, and business continuity.

    But, as important as those things are, they are not profitable in the minds of a board of directors. Nor are they sexy to a sales and marketing team. They get taken for granted as “just getting done behind the scenes”.

    Meanwhile, everyone’s real time, budget, energy, and attention is almost always focused on the next big release, or bug fixes in app code, and/or routine desktop support issues.

    It’s a huge problem. Unfortunately it’s how the moden management “style” and late stage capitalism operates. Make a fuss over these things, and you’re flagged as a problem, a human obstacle to be run over.

    • BearOfaTime@lemm.ee
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      5 months ago

      Yep - it’s a CIO/CTO/HR issue.

      Those of us designing and managing systems yell till we’re blue in the face, and CIO just doesn’t listen.

      HR is why they use crap like CrowdStrike. The funny thing is, by recording all this stuff, they become legally liable for it. So if an employee intimates they’re going to do something illegal, and the company misses is, but it’s in the database, they can be held liable in a civil case for not doing something to prevent it.

      The huge companies I’ve worked at were smart enough to not backup any comms besides email. All messaging systems data were ephemeral.

      • Boozilla@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        5 months ago

        by recording all this stuff, they become legally liable for it

        That is a damned good point and kind of hilarious. Thanks for the meaningful input (and not just being another Internet Reply Guy like some others on here).

        • restingboredface@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          5
          ·
          5 months ago

          I’m currently working for a place that has had recent entanglements with the govt for serious misconduct that hurt consumers. They have multiple policies with language in it to reduce documentation that could get them in trouble again. But minimal attention paid to the actual issues that got them in trouble.

          They are more worried about having documented evidence of bad behavior than they are of it occurring.

          I’m certain this is not unique to this company.

    • Riskable@programming.dev
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      3
      ·
      5 months ago

      everyone’s real time, budget, energy, and attention is almost always focused on the next big release, or bug fixes in app code, and/or routine desktop support issues pointless meetings, unnecessary approval steps that could’ve been automated, and bureaucratic tasks that have nothing to do with your actual job.

      FTFY.

      • John Richard@lemmy.worldOP
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        5 months ago

        Where you spend more time talking about what you’re going to do, than ever actually doing it.

        Where when you ask for a mirror of production to test in, you’re told that Bob was working on that (Bob left 5 years ago).

  • FaceDeer@fedia.io
    link
    fedilink
    arrow-up
    14
    ·
    5 months ago

    particularly for companies entrusted with vast amounts of sensitive personal information.

    I nodded along to most of your comment but this cast a discordant and jarring tone over it. Why particularly those companies? The CrowdStrike failure didn’t actually result in sensitive information being deleted or revealed, it just caused computers to shut down entirely. Throwing that in there as an area of particular concern seems clickbaity.

    • John Richard@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      11
      ·
      5 months ago

      It was to elaborate that there is a bigger issue here with corporate IT culture that is broken. The CrowdStrike incident merely exposes it, but CrowdStrike isn’t the real problem. Remediation for an event like this, especially once the fix is known, should be 30 minutes… not weeks or months.

      • RaoulDook@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        7
        ·
        5 months ago

        The OS should be mature enough by now that it could automatically recover from crashing on the load of a bad 3rd party driver. But it was not, wtf.

        • catloaf@lemm.ee
          link
          fedilink
          English
          arrow-up
          5
          ·
          5 months ago

          It can, sort of. Safe mode will still boot just fine. But then what should it do? Just blacklist the driver and reboot? That’s not going to work too well if it’s the storage driver.

          • RaoulDook@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            5 months ago

            Well they could still just blacklist all 3rd party drivers except storage drivers. Many categories of 3rd party drivers could be excluded fully during a selective recovery boot process.

        • John Richard@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          2
          ·
          5 months ago

          Microsoft has been too busy building a new Outlook PWA with ads in your email, and AI laptops that capture screenshots of your desktop in unencrypted folders.

  • Rhaedas@fedia.io
    link
    fedilink
    arrow-up
    12
    arrow-down
    1
    ·
    5 months ago

    I don’t think it’s that uncommon an opinion. An even simpler version is the constant repeats over years now of information breaches, often because of inferior protect. As a amateur website creator decades ago I learned that plain text passwords was a big no-no, so how are corporation ITs still doing it? Even the non-tech person on the street rolls their eyes at such news, and yet it continues. CrowdStrike is just a more complicated version of the same thing.

  • AnAmericanPotato@programming.dev
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    1
    ·
    5 months ago

    This doesn’t seem to be a problem with disaster recovery plans. It is perfectly reasonable for disaster recovery to take several hours, or even days. As far as DR goes, this was easy. It did not generally require rebuilding systems from backups.

    In a sane world, no single party would even have the technical capability of causing a global disaster like this. But executives have been tripping over themselves for the past decade to outsource all their shit to centralized third parties so they can lay off expensive IT staff. They have no control over their infrastructure, their data, or, by extension, their business.

  • computergeek125@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    5 months ago

    Getting production servers back online with a low level fix is pretty straightforward if you have your backup system taking regular snapshots of pet VMs. Just roll back a few hours. Properly managed cattle, just redeploy the OS and reconnect to data. Physical servers of either type you can either restore a backup (potentially with the IPMI integration so it happens automatically), but you might end up taking hours to restore all data, limited by the bandwidth of your giant spinning rust NAS that is cost cut to only sustain a few parallel recoveries. Or you could spend a few hours with your server techs IPMI booting into safe mode, or write a script that sends reboot commands to the IPMI until the host OS pings back.

    All that stuff can be added to your DR plan, and many companies now are probably planning for such an event. It’s like how the US CDC posted a plan about preparing for the zombie apocalypse to help people think about it, this was a fire drill for a widespread ransomware attack. And we as a world weren’t ready. There’s options, but they often require humans to be helping it along when it’s so widespread.

    The stinger of this event is how many workstations were affected in parallel. First, there do not exist good tools to be able to cover a remote access solution at the firmware level capable of executing power controls over the internet. You have options in an office building for workstations onsite, there are a handful of systems that can do this over existing networks, but more are highly hardware vendor dependent.

    But do you really want to leave PXE enabled on a workstation that will be brought home and rebooted outside of your physical/electronic perimeter? The last few years have showed us that WFH isn’t going away, and those endpoints that exist to roam the world need to be configured in a way that does not leave them easily vulnerable to a low level OS replacement the other 99.99% of the time you aren’t getting crypto’d or receive a bad kernel update.

    Even if you place trust in your users and don’t use a firmware password, do you want an untrained user to be walked blindly over the phone to open the firmware settings, plug into their router’s Ethernet port, and add https://winfix.companyname.com as a custom network boot option without accidentally deleting the windows bootloader? Plus, any system that does that type of check automatically at startup makes itself potentially vulnerable to a network-based attack by a threat actor on a low security network (such as the network of an untrusted employee or a device that falls into the wrong hands). I’m not saying such a system is impossible - but it’s a super huge target for a threat actor to go after and it needs to be ironclad.

    Given all of that, a lot of companies may instead opt that their workstations are cattle, and would simply be re-imaged if they were crypto’d. If all of your data is on the SMB server/OneDrive/Google/Nextcloud/Dropbox/SaaS whatever, and your users are following the rules, you can fix the problem by swapping a user’s laptop - just like the data problem from paragraph one. You just have a team scale issue that your IT team doesn’t have enough members to handle every user having issues at once.

    The reality is there are still going to be applications and use cases that may be critical that don’t support that methodology (as we collectively as IT slowly try to deprecate their use), and that is going to throw a Windows-sized monkey wrench into your DR plan. Do you force your uses to use a VDI solution? Those are pretty dang powerful, but as a Parsec user that has operated their computer from several hundred miles away, you can feel when a responsive application isn’t responding quite fast enough. That VDI system could be recovered via paragraph 1 and just use Chromebooks (or equivalent) that can self-reimage if needed as the thin clients. But would you rather have annoyed users with a slightly less performant system 99.99% of the time or plan for a widespread issue affecting all system the other 0.01%? You’re probably already spending your energy upgrading from legacy apps to make your workstations more like cattle.

    All in trying to get at here with this long winded counterpoint - this isn’t an easy problem to solve. I’d love to see the day that IT shops are valued enough to get the budget they need informed by the local experts, and I won’t deny that “C-suite went to x and came back with a bad idea” exists. In the meantime, I think we’re all going to instead be working on ensuring our update policies have better controls on them.

    As a closing thought - if you audited a vendor that has a product that could get a system back online into low level recovery after this, would you make a budget request for that product? Or does that create the next CrowdStruckOut event? Do you dual-OS your laptops? How far do you go down the rabbit hole of preparing for the low probability? This is what you have to think about - you have to solve enough problems to get your job done, and not everyone is in an industry regulated to have every problem required to be solved. So you solve what you can by order of probability.

    • John Richard@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      2
      ·
      5 months ago

      I upvoted because you actually posted technical discussion and details that are accurate. PXE and remote power management is the way. Most workstation BIOS will have IPMI functionality already included. I agree thought that being that these are remote endpoints, it can be more challenging. Having a script to reboot their endpoints into a recovery environment though would be a basic step though in any DR scenario. Mounting the OS partition to delete a file & reboot wouldn’t be a significant endeavor, although one that they’d need to make sure they got right. Still though, it would be hard to mess up for anyone with intermediate computer skills… and you’d hope these companies at least have someone trained to do that rather quickly. They’d have to spend more time writing up a CR explaining all the steps, and then joining a conference call with like 100 people with babies crying in the background… and managers insisting they remain on the call while they write the script.

  • edric@lemm.ee
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    5 months ago

    For sure there is a problem, but this issue caused computers to not be able to boot in the first place, so how are you gonna remotely reboot them if you can’t connect to them in the first place? Sure there can be a way like one other comment explained, but it’s so complicated and expensive that not all of even the biggest corporations do them.

    Contrary to what a lot of people seem to think, CrowdStrike is pretty effective at what it does, that’s why they are big in the corporate IT world. I’ve worked with companies where the security team had a minority influence on choosing vendors, with the finance team being the major decision maker. So cheapest vendor wins, and CrowdStrike is not exactly cheap. If you ask most IT people, their experience is the opposite of bloated budgets. A lot of IT teams are understaffed and do not have the necessary tools to do their work. Teams have to beg every budget season.

    The failure here is hygiene yes, but in development testing processes. Something that wasn’t thoroughly tested got pushed into production and released. And that applies to both Crowdstrike and their customers. That is not uncommon (hence the programmer memes), it just happened to be one of the most prevalent endpoint security solutions in the world that needed kernel level access to do its job. I agree with you in that IT departments should be testing software updates before they deploy, so it’s also on them to make sure they at least ran it in a staging environment first. But again, this is a tool that is time critical (anti-malware) and companies need to have the capability to deploy updates fast. So you have to weigh speed vs reliability.

    • John Richard@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      6
      ·
      5 months ago

      Booting a system or recovery image remotely over an IPMI or similar interface is not complicated or expensive. It is one of the most basic server management tasks. You acting like the concept is challenging seriously concerns me and I seriously wonder how anyone that thinks like that gets hired.

      There are exceptions, granted. However, the IT budget at most mid to large-size corporations is extremely bloated. I don’t think you can in good faith argue otherwise, unless you want to show me a budget that isn’t. Do you have a real one that you can provide?

      These companies don’t even attract smart talent. They attract people that are complacent with doing nothing & collecting a paycheck. Smart people do not continue to work at these companies. The bureaucracy and management is soul-sucking. It took me a while to accept it too. I used to be optimistic thinking there is a logical explanation that can be fixed. Turns out they don’t want to be fixed. They like to be broken. Like I said, it starts from the top down. A lot of the staff wouldn’t even have a job if people actually tried to make things better.

      • edric@lemm.ee
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        5 months ago

        It is one of the most basic server management tasks.

        Except these were endpoint machines, not servers. Things grinded to a halt not because servers went down, but because the computers end users interacted with crashed and wouldn’t boot, kiosk and POS systems included.

        You acting like the concept is challenging seriously concerns me and I seriously wonder how anyone that thinks like that gets hired.

        Damn, I guess all the IT people running the systems that were affected aren’t fit for the job.

        unless you want to show me a budget that isn’t. Do you have a real one that you can provide?

        Can YOU show me the bloated budgets and where they are allocated on those mid to large size corporations? You are the one who insinuated that. All I said is that my experience for all the companies I worked with is that we always had to fight hard for budget, because the sales and marketing departments bring in the $$$ and that’s only what the executives like to see, therefore they get the budget. If your entire working experience is that your IT team had too much budget, then consider yourself privileged.

        It’s weird how you’re all defensive and devolve to insults when people are just responding to your post.

        • John Richard@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          3
          ·
          5 months ago

          Except these were endpoint machines, not servers. Things grinded to a halt not because servers went down, but because the computers end users interacted with crashed and wouldn’t boot, kiosk and POS systems included.

          Endpoint machines still have IPMI type of interfaces and PXE. When you manage thousands of machines, if you treat them all like a pet then you’re doing it wrong.

          Damn, I guess all the IT people running the systems that were affected aren’t fit for the job.

          Is it going to take them several days to weeks to recover? Then they aren’t fit for the job, or should consider another profession.

          Can you show me the bloated budgets and where they are allocated on those mid to large size corporations?

          All of them. The Form 10k fillings are available for public corporations. The ones claiming that they will be impacted for a while are the ones I’m concerned most about.

          It’s weird how you’re all defensive and devolve to insults when people are just responding to your post.

          I spent a career arguing with sales reps who had one goal in mind, and that was to make the biggest commission possible. I sound argumentative because those sales reps had every tool imaginable to show up out of no where.

  • viking@infosec.pub
    link
    fedilink
    English
    arrow-up
    5
    ·
    5 months ago

    Is there a way to remotely boot into network activated recovery mode? Genuine question, I never looked into it.

    • lud@lemm.ee
      link
      fedilink
      English
      arrow-up
      5
      ·
      5 months ago

      For physical servers there are out of band management systems like Dell DRAC that allows you to manage the server even when the OS is broken or non existent.

      For clients there are systems like Intel vPRO and AMD AMT. I have not used either of them but they apparently work similarly to the systems used on servers.

      • daddy32@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        5 months ago

        At least for virtual servers, There has to be a cheaper software equivalent, as my cheap VPS allows this (via vnc) with no issues.

        • computergeek125@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          5 months ago

          Virtual servers (as opposed to hardware workstations or servers) will usually have their “KVM” (Keyboard Video Mouse) built in to the hypervisor control plane. ESXi, Proxmox (KVM - Kernel Virtual Machine), XCP-ng/Citrix XenServer (Xen), Nutanix (KVM-like), and many others all provide access to this. It all comes down to what’s configured on the hypervisor OS.

          VMs are easy because the video and control feeds are software constructs so you can just hook into what’s already there. Hardware (especially workstations) are harder because you don’t always have a chip on the motherboard that can tap that data. Servers usually have a dedicated co-computer soldered onto the motherboard to do this, but if there’s nothing nailed down to do it, your remote access is limited to what you can plug in. PiKVM is one such plug-in option.

          • daddy32@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            5 months ago

            Thank you for the explanation, I really appreciate it. Bystanders will probably too :)