when your one job is to prevent stuff like this from happening, then you pull a better denial of service by accident than any cybercriminal could dream of.
It's friggin' mind boggling that they haven't tested it on a single live test pc before pushing it out to millions of them. Wowwza! I'm sure they will from now on, but the damage has already been done. That dude at the end took a shot of whiskey to drown his sorrows. lol
It will read: "CloudStrike a former cloud security company has fucked up millions of computers around the world by not testing its update on a single live test pc" That dude at the end of the video took a shot of whiskey to drown his sorrows. lol
Nah, they’ll stick around. I’d imagine this will present a pretty solid buy opportunity for some heavily discounted crowdstrike shares. Had this been the product of a breach, I’d be with you. It’d be time for most of them to clean out their desks. As it stands though? I trust they’ll weather this just fine. It’s gonna be a rough few moths for anyone unfortunate enough to be working there though, for sure.
@@williambrasky3891 - Imagine placing an order for a company which could potentially crash your pc during the order. lol It was down around 20% in the morning but recovered with a 10% loss by the day's end.
@@williambrasky3891Airlines have to reimburse customers for the cancelled flights. Crowdstrike is 100% viable for damages, whether or not they will pay the damages or be forced to pay them in court is yet to be seen. No matter the case I 100% doubt Crowdstrike will be around in a year. Short the stock.
Incorrect, never INSTALL updates on Friday. You can push them out all you want just as an Admin you should have blocks in place. In reality as a SysAdmin we're supposed to test updates before we let them install on production machines. ESPECIALLY for banks, and other critical infrastructure. I blame bad IT, that's as someone who does this. None of our clients had this issue, our impact was limited to third parties who didn't know wtf they were doing.
@@GeorgeWashingtonLaserMusket They're a reputable company pushing out critical security updates, it's literally an automated process because of how important it is.
@@GeorgeWashingtonLaserMusket Nah, don't tempt fate! The original commenter was correct! Never push out updates on a Friday! Let me ask you... When was your last vacation?
@ortivox I am sorry buddy but if you tempt fate it will catch up to you sooner or later! Humans make mistakes, you cannot count on being infallible, there is always a weak link somewhere! If you don't believe me you will eventually find out the hard way! I bet you deserve a vacation too!
As someone who works in IT and has been leading employees through safe mode, bitlocker, and into system32, I can safely say that today has been a shit show. Though it's also days like today that show me how much I love what I do. I've definitely earned my weekend this weekend....if I even get one 😅
I am per-historic. There was a World before Windows and I have dumped Windows a few years ago entirely and went back to LINUX or UNIX. Totally done with that BS of incompetent People.
@@MBrieger What about a CrowdStrike Kernal level bug strikes you as being a windows issue? Do you think a Linux machine would be immune to a bug in a program running in the Kernal?
I’m surprised it’s been so easily accepted as a “mistake”. The fact that if you simply tested this on 1 windows machine before rollout you would’ve know what you were in for. There is zero excuse for this, I wouldn’t even call in incompetency with the size of the org and client scale we are talking about here.
i'm sure they tested it on at least 1 machine--the machine they developed the update on. As far as I understand things, It's literally impossible for the update to not have been run on at least 1 machine before it was deployed
Remember, kids: "Remember, kids" and "remember kids" mean two different things. Go back to school, kids, learn what you have missed. (Don't "go back to school kids", you'll be looked at funny first, then arrested.)
Hundreds of production companies in Germany DO NOT connect their production facilities to the internet and Industry 4.0 (Internet of things) because of the immense risks that come with it. The attack vectors would just explode.
@@liamblu which is the smart thing to do, there are far too many needlessly exposed systems on the internet; having an entire extra attack surface not out of necessity is pointless
Absolutely humiliating. Sophos and Kaspersky must be popping bottles of Champaign and getting every sales rep on payroll ready for the calls on Monday.
My favorite quote from the matter is the one line in the summary " CrowdStrike is aware of reports of crashes on Windows hosts related to the Falcon Sensor." straight out of the drake and josh. oh really when did you notice was it when you went to get a coffee from fliping Starbucks.
Crowdstrike committed _two_ cardinal DevOps sins simultaniously: _never deploy to prod on a Friday_ (self explanatory), and _never break rollback_ (having to physically and manually go to each machine to repair it definitely counts as "breaking rollback").
The irony of a cybersec company doing worse damage than the hackers/hacks it claims to protect against is so funny. You can combine all hacker groups and still they won't be able to wreak so much havoc. This also begs the question - why does so much of the world's critical infrastructure depends on a closed source OS and a tool with kernal level access on that same OS. If anything, CrowdStrike just put up a neon sign saying "We could be your next surface for a global supply chain attack"
Enterprise cyber security isn't about security tho. It's about liability. You need big companies you can point at when shit goes wrong. "We checked all the boxes, not our fault", then insurance pays out, and life goes on without anyone needing to take responsibility or suffer consequences (other than the millions of actual humans affected, but that's barely worth mentioning)
Lol you really dont think there will be a massive wave of lawsuits at crowdstrike? This is about as bad as it gets, we will see if the company can even survive.
Ive struggled getting into safemode on computers that will not boot before. Did you just hard reset until it have you the menu for it or did you use other method? That mess with needing to hold down shift while clicking restart always kills me since I need the machine to start up properly before I can do that.
I also work at intel - I was on the phone with TAC waiting on hold, when the whole phone system went down and hung up - calling the tac number back just resulted in a busy tone. F it, I give up - not spending the rest of my afternoon listening to hold music
The corpo response / reporting on this is the worst. From that ‘CEO’ resolving it’ a fix admins should be able to do within around 60 seconds per machine, so there’s no security issue whatsoever actually
I worked for Wells Fargo for 30 years. I could hear management sphincters slam shut when the fertilizer hit the ventilation system and I am in Oklahoma.
@_Zie_ How about if a malicious actor pushes a malicious automatic uncontrolled update that steals data? Clearly they didn't have enough procedures to stop a broken update that bricks every system, what's there to stop a malicious update?
@_Zie_ Why would you rely on a third party for all your company's security needs. There are tons of ways to prevent or mitigate a zero day exploit. The problem is because of companies like Crowdstrike, customers believe they can forget basic in house security.
LOL! they got the "No reboots" part right!! No boots at all. damn, dude. all those PCs all across the land. far and wide. someone is gonna have to put hands on all those machines.
@ortivox it is crowdstrike's fault to not QA test the update properly before sending it out to be updated. I am just giving an average linux shillings comment for the lulz. Also, no system is inherently safe regardless of the operating System
Oh yes they might just go bankrupt for this. They will be sued for all the losses that all the companies that use their product had and will have. Well at least for the Friday PLUS all the costs for deploying people to manually fix their own PCs. That can easily become hundreds of millions of dollars plus lawyer costs.
@@itsmerg5273 ...not a simple restart, no. But the procedure REQUIRES manually restarting every affected machine in order to make the needed changes to let it finally boot without going into its restart loop so that the rollback to functional can take place. So no, the windbag isn't saying anything except *_"nyaah nyaaaah, look at me!"_*
As someone who has been interested in Security Nightmares for some time, I am not surprised that such a catastrophe has occurred. After all, it was foreseeable that it would happen sooner or later. But I can't help but wonder how it is that nobody is still demanding that software manufacturers are liable for damage caused by their junk software. Because as long as IT companies like CrowdStrike get away with a slap on the wrist, nothing will change. Then it's only a matter of time till the next security nightmare.
Bro it's 4:30 AM where I live and I logged in on my leave at 8:00 PM and the systems still don't seem stayble we are constantly on a Bridge call trying to resolve this mess
Anyone else wondering about potentially bad usbs being inserted 'while we're at it'? I'm not an expert but this seems to be a very vulnerable moment for many computers.
Look at the stock prices of Crowdstrike and Microsoft, both were down at same time Tuesday already. Someone knew this bug was coming, waiting stocks to go down even more
@@kartoffelwaffel Unfortunately I worked for McAfee when this happened and was responsible to dispatch consultants to fix the issue. Its not because the press doesnt talk about it that no companies were affected. These things are only spectacular if an airport is affected, you hear nothing if factories or hospitals are affected.
Crowdstrike should go out of business. CEO should be fired. REDHAT must develop a friendly, desktop version of Linux that RIVALS Windows. (or we could just do nothing - and wait till it happens again)
Previously, if asked why I always disable auto-update on every device I own, I would explain at length the negative consequences I've experienced. In future, I'll just say "Crowdstrike".
Hopefully people will start to see how awful automatic and forced updates are (but I doubt it), imho they don't do much other than keeping some developer employed. Similar thing happened way back when MS force updated machines to windows 10.
still funny how my first thought was just windows crashing issue instead of thinking of some insane hacker attack until I got to check the actual news and man what a way to live up your name XD
I'm still seeing news sources and instagram posts blame "Windows" / Microsoft, despite the knowledge of it being Crowdstrike is now widely known. Unfair to Microsoft! lol
They deserve the blame for making an OS so bad, that companies have to add another security blanket on top of it just to be able to use it reliably. ALL of the blame goes to microsoft - their garbage os is the reason crowdstrike even exists
Good luck getting any work done on linux. If you're not an IT person or webapp warrior, there is an extremely high chance that you will be missing applications that are essential to your job. And I say that as a long term linux user who has been searching for a halfway usable and affordable CAD software for Linux (usable automatically excludes freecad)
@@CRK1918 Technically yes, since the error was a page fault, doing the same thing that patch did but for mac/linux would yield similiar results. This is nothing special, since the computer crashing is expected behavior for a driver error (this is easily preventable by testing the driver on a virtual machine, something the person pushing the update didnt do)
@@Mooooov0815 They're the only ones I've run into recently with the creepy surveillance messaging. I cant think of anyone else wanting to help intimidate your employees in this way.
This is baffling. If every PC with the update goes into a boot loop, and the update got pushed, doesn't that imply that Crowdstrike didn't test the update on a single Windows PC before releasing it worldwide? Anyway, how much do yall think it costs to disable half the world economy for a day?
when your one job is to prevent stuff like this from happening, then you pull a better denial of service by accident than any cybercriminal could dream of.
😂😂😂
🎯
You underestimate the cyber criminals
@@sanityd1 When was the last time when some cyber criminals managed to do something similar?
@@Alfred-NeumanWhen Dyn was ddosed 🦉
"Cut the QA Dept. We haven't had an issue in years!"
lmfaooo!!!
@@usernametaken3098 Yep why pay devs who have experience when I can use a $13/mo AI subscription to do the work for me? /s
How many Data-Centers or so called Holy Cows of Could Services have gone Banana? 🍌
It's friggin' mind boggling that they haven't tested it on a single live test pc before pushing it out to millions of them. Wowwza! I'm sure they will from now on, but the damage has already been done. That dude at the end took a shot of whiskey to drown his sorrows. lol
They will still get the bonuses
At this point, the real question is how long will it be before the wikipedia moderators need to change "is" to "was" on Crowdstrike's wikipedia page.
It will read: "CloudStrike a former cloud security company has fucked up millions of computers around the world by not testing its update on a single live test pc" That dude at the end of the video took a shot of whiskey to drown his sorrows. lol
Nah, they’ll stick around. I’d imagine this will present a pretty solid buy opportunity for some heavily discounted crowdstrike shares. Had this been the product of a breach, I’d be with you. It’d be time for most of them to clean out their desks. As it stands though? I trust they’ll weather this just fine. It’s gonna be a rough few moths for anyone unfortunate enough to be working there though, for sure.
@@williambrasky3891 - Imagine placing an order for a company which could potentially crash your pc during the order. lol It was down around 20% in the morning but recovered with a 10% loss by the day's end.
Seed get out of here 😭
@@williambrasky3891Airlines have to reimburse customers for the cancelled flights. Crowdstrike is 100% viable for damages, whether or not they will pay the damages or be forced to pay them in court is yet to be seen. No matter the case I 100% doubt Crowdstrike will be around in a year. Short the stock.
Never push out updates on a Friday
Incorrect, never INSTALL updates on Friday. You can push them out all you want just as an Admin you should have blocks in place. In reality as a SysAdmin we're supposed to test updates before we let them install on production machines. ESPECIALLY for banks, and other critical infrastructure.
I blame bad IT, that's as someone who does this. None of our clients had this issue, our impact was limited to third parties who didn't know wtf they were doing.
@@GeorgeWashingtonLaserMusket They're a reputable company pushing out critical security updates, it's literally an automated process because of how important it is.
Freaky Friday
@@GeorgeWashingtonLaserMusket Nah, don't tempt fate! The original commenter was correct! Never push out updates on a Friday! Let me ask you... When was your last vacation?
@ortivox I am sorry buddy but if you tempt fate it will catch up to you sooner or later! Humans make mistakes, you cannot count on being infallible, there is always a weak link somewhere! If you don't believe me you will eventually find out the hard way! I bet you deserve a vacation too!
"You can't hack a system if the system doesn't work! " - Cybersecurity intern pushing the update
@@Beehive151you mean .gif
10 points
As someone who works in IT and has been leading employees through safe mode, bitlocker, and into system32, I can safely say that today has been a shit show. Though it's also days like today that show me how much I love what I do. I've definitely earned my weekend this weekend....if I even get one 😅
I am per-historic. There was a World before Windows and I have dumped Windows a few years ago entirely and went back to LINUX or UNIX.
Totally done with that BS of incompetent People.
@@MBrieger It wasn't Microsoft's fault this time.
@@vidal9747 Yes it was. If it were Hacker-Proof, the add-on Software wouldn't be needed.
Far out, I feel for you man. I'm sitting here feeling like I've dodged a freaking cannonball round, rather than a bullet.
@@MBrieger What about a CrowdStrike Kernal level bug strikes you as being a windows issue?
Do you think a Linux machine would be immune to a bug in a program running in the Kernal?
I’m surprised it’s been so easily accepted as a “mistake”. The fact that if you simply tested this on 1 windows machine before rollout you would’ve know what you were in for. There is zero excuse for this, I wouldn’t even call in incompetency with the size of the org and client scale we are talking about here.
Incompetency of a single employee, negligence from the company
AFAIK it didn't hit every Windows server.
i'm sure they tested it on at least 1 machine--the machine they developed the update on. As far as I understand things, It's literally impossible for the update to not have been run on at least 1 machine before it was deployed
When there is no SEC type of regulations on API this is what happens
Remember kids, when its a friday just push that shit to production and go home.
Nah don't push it yourself that would be crazy
have the automation do it instead
Use ur colleagues' computer instead
Remember, kids: "Remember, kids" and "remember kids" mean two different things. Go back to school, kids, learn what you have missed. (Don't "go back to school kids", you'll be looked at funny first, then arrested.)
So, if you exploit CrowdStrike, you pwn the world? And companies are fine being this centralized?
Hundreds of production companies in Germany DO NOT connect their production facilities to the internet and Industry 4.0 (Internet of things) because of the immense risks that come with it. The attack vectors would just explode.
@@liamblu which is the smart thing to do, there are far too many needlessly exposed systems on the internet; having an entire extra attack surface not out of necessity is pointless
literally the corporations version of EAC.
Why anyone thinks centralised security is a good idea is beyond me.
@@computerpastiche Exactly
Absolutely humiliating. Sophos and Kaspersky must be popping bottles of Champaign and getting every sales rep on payroll ready for the calls on Monday.
Kaspersky has no future in the US. So probably not.
Definitely for sophos XDR
@@michael.sierraThey can still sell to every other country affected by this.
Joke on Kaspersky dey got BANNED in the U.S.
@@michael.sierrait didn't I think people might reconsider the option now.
My favorite quote from the matter is the one line in the summary " CrowdStrike is aware of reports of crashes on Windows hosts related to the Falcon Sensor." straight out of the drake and josh. oh really when did you notice was it when you went to get a coffee from fliping Starbucks.
As a barista you'd be surprised at how many people are just learning about this from me
You were insanely quick to release a video about this. Would love to see more of these "it happened just now" type of videos.
You call this fast, this happened over 12 hours ago. John Hammond made a video 12 hours ago.
Technically this happened over 18 hours ago. It started in the morning for Australia, midnight for India and well a day early in US 😂
Not exactly insanely quick lol.
Quick? 🤣🤣🤣🤣🤣🤣🤣🤣 So you just logged on for the day? This video's in "Johnny come lately bringing up the rear" territory.
What happens now, happens now. You're looking at now, sir.
Crowdstrike committed _two_ cardinal DevOps sins simultaniously: _never deploy to prod on a Friday_ (self explanatory), and _never break rollback_ (having to physically and manually go to each machine to repair it definitely counts as "breaking rollback").
The irony of a cybersec company doing worse damage than the hackers/hacks it claims to protect against is so funny. You can combine all hacker groups and still they won't be able to wreak so much havoc.
This also begs the question - why does so much of the world's critical infrastructure depends on a closed source OS and a tool with kernal level access on that same OS.
If anything, CrowdStrike just put up a neon sign saying "We could be your next surface for a global supply chain attack"
Enterprise cyber security isn't about security tho. It's about liability. You need big companies you can point at when shit goes wrong. "We checked all the boxes, not our fault", then insurance pays out, and life goes on without anyone needing to take responsibility or suffer consequences (other than the millions of actual humans affected, but that's barely worth mentioning)
Y2K in modern day. We love to see it, only now it's actually called Y24
When the anti ransomware ransomwares you.
... but the Cat Movies on TH-cam still work .... 😸
It's not ransoware, even ransomware like! It's more like a worm, or in character denial-of-service
It was at this moment..
Well, they certainly Struck the Crowd!
The severity and scope of this is really unacceptable. And I already know that nobody will be held accountable.
The severity is due to the nature of their product, the scope is due to the free market.
@@plus-boy and? They still have a responsibility, maybe even more so because of the scope.
Lol you really dont think there will be a massive wave of lawsuits at crowdstrike? This is about as bad as it gets, we will see if the company can even survive.
i use arch linux btw
@@pulls8 i doubt all the companies will give them a free pass. getting money from lawsuits is buisness 101 in america.
Crowdstrike striked itself
Just spent 13 hours at intel in Ireland trying to fix this... it was hell.... Fun fact the boot to safe mode dosnt work half of the time
Ive struggled getting into safemode on computers that will not boot before. Did you just hard reset until it have you the menu for it or did you use other method? That mess with needing to hold down shift while clicking restart always kills me since I need the machine to start up properly before I can do that.
I also work at intel - I was on the phone with TAC waiting on hold, when the whole phone system went down and hung up - calling the tac number back just resulted in a busy tone. F it, I give up - not spending the rest of my afternoon listening to hold music
The corpo response / reporting on this is the worst. From that ‘CEO’ resolving it’ a fix admins should be able to do within around 60 seconds per machine, so there’s no security issue whatsoever actually
Great upload, my team's group chat was going crazy even the IT guys weren't any help haha this happened on a Friday here so it was fun 😆
yup
Poor guy looks like he was about to break down crying
I worked for Wells Fargo for 30 years. I could hear management sphincters slam shut when the fertilizer hit the ventilation system and I am in Oklahoma.
that's why automatic uncontrolled updates is worst of a kind.
@_Zie_ How about if a malicious actor pushes a malicious automatic uncontrolled update that steals data? Clearly they didn't have enough procedures to stop a broken update that bricks every system, what's there to stop a malicious update?
@_Zie_ Why would you rely on a third party for all your company's security needs. There are tons of ways to prevent or mitigate a zero day exploit. The problem is because of companies like Crowdstrike, customers believe they can forget basic in house security.
that ceo was gaslighting so much he choked on his words
Nice buzzword bro
He's there for the fix, but ultimately he will be replaced.
You can't hack our systems if there are no systems!
Well played Crowdstrike, well played 👏👏👏
LOL! they got the "No reboots" part right!! No boots at all. damn, dude. all those PCs all across the land. far and wide. someone is gonna have to put hands on all those machines.
Waking up knowing I did not have to deal with this was a relief.
Well, they struck the crowd. 😂
"...all updates are preformed silently and automatically..."
That is, by far... the worst.
I now have crowdstrike related ptsd. I was woken up on call at 0630 as the on call senior engineer.
Linux for the win.....until a new backdoor gets pushed
wouldn't change anything either way. This just so happens to affect windows systems, but thats in no way a flaw inherent to windows after all
Tbf the backdoor never went mainstream
@ortivox it is crowdstrike's fault to not QA test the update properly before sending it out to be updated. I am just giving an average linux shillings comment for the lulz. Also, no system is inherently safe regardless of the operating System
Oh yes they might just go bankrupt for this. They will be sued for all the losses that all the companies that use their product had and will have. Well at least for the Friday PLUS all the costs for deploying people to manually fix their own PCs. That can easily become hundreds of millions of dollars plus lawyer costs.
I've never seen a blue screen or black
Screen on a Linux computer...
This really proves the old adage ::;
"Too many cooks spoil the broth."
my flight got delayed man
are they paying out compensation for this?
@@basedaf5580Most likely, at least here in the EU or the US.
rip
@@basedaf5580 Has to be delayed for more than 3 hours to get compensated in the EU
Which one was the "delayed man"? The pilot?
CrowdStrike has striked the crowd...
Poor poor IT teams being made to manually restart all their devices..
You must not be very bright
@@reapthewhirlwind6915 huh??? Wym dude.. If you have an issue use your words to explain it not insult someone.
@@MizzyMiz I think he saying that because this issue doesn't get fixed by restarting devices
@@itsmerg5273 ...not a simple restart, no. But the procedure REQUIRES manually restarting every affected machine in order to make the needed changes to let it finally boot without going into its restart loop so that the rollback to functional can take place.
So no, the windbag isn't saying anything except *_"nyaah nyaaaah, look at me!"_*
@@itsmerg5273 OP means manually booting the system into safe mode to delete the C-00000291*.sys file
Only the unaffected will be watching today.
As someone who has been interested in Security Nightmares for some time, I am not surprised that such a catastrophe has occurred. After all, it was foreseeable that it would happen sooner or later. But I can't help but wonder how it is that nobody is still demanding that software manufacturers are liable for damage caused by their junk software.
Because as long as IT companies like CrowdStrike get away with a slap on the wrist, nothing will change. Then it's only a matter of time till the next security nightmare.
Lol best update ever it was so funny to see people confused at self checkouts.
This is now the new Y2K.
the friday deploy curse strikes again
I had personally only heard of the airport side of things until now. What a glorious cluster fuck ❤
Today was a nightmare dealing with this....
Had to migrate some VM storage to mount the disk and remove the file.
The crowd has been stricken.
Bro it's 4:30 AM where I live and I logged in on my leave at 8:00 PM and the systems still don't seem stayble we are constantly on a Bridge call trying to resolve this mess
I guess they hold to the "Best code testing is done Production" motto.
They tried to load a driver with nothing but null bytes in it.
At least 3 airlines have grounded all flights. This is quite big!
Anyone else wondering about potentially bad usbs being inserted 'while we're at it'? I'm not an expert but this seems to be a very vulnerable moment for many computers.
Well gonna be one helluva long weekend for IT personel sadly :/
When the public become the beta testers.... Decades in the making! Push it out, let the sh*t hit the fan and then fix it if needed.
I’m glad I left Retail, it would be a clusterfuck trying to help customers find products, pay for items and all inventory stuff
“This led ai to take over the world leading to a second dark ages” 😂😂😂
Your are correct this is exactly the Y2K bug issue.
Look at the stock prices of Crowdstrike and Microsoft, both were down at same time Tuesday already. Someone knew this bug was coming, waiting stocks to go down even more
Somewhere there is a dev and one or two QAs hitting the bottle
nah bro, they fired the QA team that was the problem
This bug was so bad it made Seytonic say the Fuck word!
So that explains my e-banking being down
When code running at ring0 dereferences a null pointer...🤯
Glad I made the simple decision as an admin and just stuck with Microsoft Defender XDR.
People are short of memory. Happened in 2010 with mcafee as well. McAfee's "DAT" file version 5958.
Not on this scale
@@kartoffelwaffel do some research before claiming
@@indridcold2872 Speak for yourself. That was nowhere near the scale of this outage.
@@kartoffelwaffel Unfortunately I worked for McAfee when this happened and was responsible to dispatch consultants to fix the issue. Its not because the press doesnt talk about it that no companies were affected. These things are only spectacular if an airport is affected, you hear nothing if factories or hospitals are affected.
Crowdstrike should go out of business.
CEO should be fired.
REDHAT must develop a friendly, desktop version of Linux that RIVALS Windows.
(or we could just do nothing - and wait till it happens again)
I can't believe we got Y2K before GTA6
As an MSSP employee, it was a long day of customers mistaking this bug for ransomeware
how much you wanna bet they downsized QA and Testing depts.
imagine when the SolarWInds stuff hits then.... were fukced
Who needs hackers?They will just do it to themselves
I once was thinking of installing crowdstrike on my on personal pc as I saw them sponsor TPSC but I'm fricking glad I didn't. 💀
Imagine being an anti-virus company and accidentally creating a zero day exploit and then using it. :D
welp, imagine everyone just quits and deletes their linked in
Previously, if asked why I always disable auto-update on every device I own, I would explain at length the negative consequences I've experienced. In future, I'll just say "Crowdstrike".
Hopefully people will start to see how awful automatic and forced updates are (but I doubt it), imho they don't do much other than keeping some developer employed. Similar thing happened way back when MS force updated machines to windows 10.
the bug is that the file has no data inside it causing a null pointer refrence
null pointer reference is big oops for them, they may not tested on a live machine internally at all.
Someone tried to get a headstart on skynet😂
Why I turn off automatic updates on EVERY piece of tech I own.
yeha ive been seeing a lot of mainstream media articles hardly even mentioning crowdstrike and making it seem like its all microsoft fault
At least they updated 😂🤣
Joke 😑
I was busy today with this mess
thx for summarising this short and concise ❤
The speech problem he was facing happens to me too randomly. Its just a dry throat
still funny how my first thought was just windows crashing issue instead of thinking of some insane hacker attack until I got to check the actual news and man what a way to live up your name XD
It's a good day to be using Linux
Crowd strike is now famous across the world not just because of their name.
I'm still seeing news sources and instagram posts blame "Windows" / Microsoft, despite the knowledge of it being Crowdstrike is now widely known. Unfair to Microsoft! lol
They deserve the blame for making an OS so bad, that companies have to add another security blanket on top of it just to be able to use it reliably. ALL of the blame goes to microsoft - their garbage os is the reason crowdstrike even exists
@ortivox Yeah, the OG "bad actors" are Microsoft "let's just release this turd upon the world - what's the worst that could happen??"
maybe now is good time for people to change to linux
I actually, you know, want my shit to work instead of tinkering as Todd Howard says.
Good luck getting any work done on linux. If you're not an IT person or webapp warrior, there is an extremely high chance that you will be missing applications that are essential to your job. And I say that as a long term linux user who has been searching for a halfway usable and affordable CAD software for Linux (usable automatically excludes freecad)
This has nothing to do with windows lol
@@tjgdddfcn Although officially they stated Linux + Macs was not affected, If we put the similar code in the Linux kernel might do the same?
@@CRK1918 Technically yes, since the error was a page fault, doing the same thing that patch did but for mac/linux would yield similiar results. This is nothing special, since the computer crashing is expected behavior for a driver error (this is easily preventable by testing the driver on a virtual machine, something the person pushing the update didnt do)
Headquarter in Cupertino is partying hard today
Very interesting, it shows who doesn't do any testing and probably worse, have no disaster recovery. The stock market is luckily too thick.
The boss man from Crowdstrike just realised his life is over and will be considered to be a giant bellend till the end of time .
this is what you get for installing kernel level malware in your system
Crowdstrike is best described as a way to slow down thousands of computers at once while also being able to send creepy messages to your employees.
well, which endpoint antivirus solution can't be described like this
@@Mooooov0815 They're the only ones I've run into recently with the creepy surveillance messaging. I cant think of anyone else wanting to help intimidate your employees in this way.
I recall when McAfee av update did the same to windows 7 few years ago
The kernel driver providing the antivirus in the update was literally all zeroes
As bad as this is I feel sorry for the engineers at croudstrike
Now Microsoft really knows their market
They did Strike the Crowd that's for sure
They took no reboots too seriously, it looks like
my man 💯👍
This is baffling. If every PC with the update goes into a boot loop, and the update got pushed, doesn't that imply that Crowdstrike didn't test the update on a single Windows PC before releasing it worldwide?
Anyway, how much do yall think it costs to disable half the world economy for a day?
12% of their enormous market cap apparently
@@jmanakajosh9354 That's no direct cost to anyone tho, especially not to the company
No reboots indeed lol
I feel really bad for the CEO that's rough as fuck and I can tell he hasn't relaxed for even 1 second as of this happening... Big Oof!
I know, you can see he's nervous as all hell
Bro was one email away from getting an aneurysm
This is why you pay CEOs the big bucks. Don't feel bad. Even if he gets fired he'll live on yacht somewhere and be swiping on his phone for your wife.