XM n’offre pas ses services aux résidents des États-Unis d’Amérique.

CrowdStrike update that caused global outage likely skipped checks, experts say



<html xmlns="http://www.w3.org/1999/xhtml"><head><title>CrowdStrike update that caused global outage likely skipped checks, experts say</title></head><body>

By Zeba Siddiqui

SAN FRANCISCO, July 19 (Reuters) -Security experts said CrowdStrike's CRWD.O routine update of its widely used cybersecurity software, which caused clients' computer systems to crash globally on Friday, apparently did not undergo adequate quality checks before it was deployed.

The latest version of its Falcon Sensor software was meant make CrowdStrike clients' systems more secure against hacking by updating the threats it defends against. But faulty code in the update files resulted in one of the most widespread tech outages in recent years for companies using Microsoft's MSFT.O Windows operating system.

Global banks, airlines, hospitals and government offices were disrupted. CrowdStrike released information to fix affected systems, but experts said getting them back online would take time as it required manually weeding out the flawed code.

"What it looks like is, potentially, the vetting or the sandboxing they do when they look at code, maybe somehow this file was not included in that or slipped through," said Steve Cobb, chief security officer at Security Scorecard, which also had some systems impacted by the issue.

Problems came to light quickly after the update was rolled out on Friday, and users posted pictures on social media of computers with blue screens displaying error messages. These are known in the industry as "blue screens of death."

Patrick Wardle, a security researcher who specialises in studying threats against operating systems, said his analysis identified the code responsible for the outage.

The update's problem was "in a file that contains either configuration information or signatures," he said. Such signatures are code that detects specific types of malicious code or malware.

"It's very common that security products update their signatures, like once a day... because they're continually monitoring for new malware and because they want to make sure that their customers are protected from the latest threats," he said.

The frequency of updates "is probably the reason why (CrowdStrike) didn't test it as much," he said.

It's unclear how that faulty code got into the update and why it wasn't detected before being released to customers.

"Ideally, this would have been rolled out to a limited pool first," said John Hammond, principal security researcher at Huntress Labs. "That is a safer approach to avoid a big mess like this."

Other security companies have had similar episodes in the past. McAfee's buggy antivirus update in 2010 stalled hundreds of thousands of computers.

But the global impact of this outage reflects CrowdStrike's dominance. Over half of Fortune 500 companies and many government bodies such as the top U.S. cybersecurity agency itself, the Cybersecurity and Infrastructure Security Agency, use the company's software.



Reporting by Zeba Siddiqui in San Francisco; Editing by Cynthia Osterman

</body></html>

Avertissement : Les entités de XM Group proposent à notre plateforme de trading en ligne un service d'exécution uniquement, autorisant une personne à consulter et/ou à utiliser le contenu disponible sur ou via le site internet, qui n'a pas pour but de modifier ou d'élargir cette situation. De tels accès et utilisation sont toujours soumis aux : (i) Conditions générales ; (ii) Avertissements sur les risques et (iii) Avertissement complet. Un tel contenu n'est par conséquent fourni que pour information générale. En particulier, sachez que les contenus de notre plateforme de trading en ligne ne sont ni une sollicitation ni une offre de participation à toute transaction sur les marchés financiers. Le trading sur les marchés financiers implique un niveau significatif de risques pour votre capital.

Tout le matériel publié dans notre Centre de trading en ligne est destiné à des fins de formation / d'information uniquement et ne contient pas – et ne doit pas être considéré comme contenant – des conseils et recommandations en matière de finance, de fiscalité des investissements ou de trading, ou un enregistrement de nos prix de trading ou une offre, une sollicitation, une transaction à propos de tout instrument financier ou bien des promotions financières non sollicitées à votre égard.

Tout contenu tiers, de même que le contenu préparé par XM, tels que les opinions, actualités, études, analyses, prix, autres informations ou liens vers des sites tiers contenus sur ce site internet sont fournis "tels quels", comme commentaires généraux sur le marché et ne constituent pas des conseils en investissement. Dans la mesure où tout contenu est considéré comme de la recherche en investissement, vous devez noter et accepter que le contenu n'a pas été conçu ni préparé conformément aux exigences légales visant à promouvoir l'indépendance de la recherche en investissement et, en tant que tel, il serait considéré comme une communication marketing selon les lois et réglementations applicables. Veuillez vous assurer que vous avez lu et compris notre Avis sur la recherche en investissement non indépendante et notre avertissement sur les risques concernant les informations susdites, qui peuvent consultés ici.

Avertissement sur les risques : votre capital est à risque. Les produits à effet de levier ne sont pas recommandés pour tous. Veuillez consulter notre Divulgation des risques