Hindi nagbibigay ng serbisyo ang XM sa mga residente ng Estados Unidos.

CrowdStrike update that caused global outage likely skipped checks, experts say



<html xmlns="http://www.w3.org/1999/xhtml"><head><title>CrowdStrike update that caused global outage likely skipped checks, experts say</title></head><body>

By Zeba Siddiqui

SAN FRANCISCO, July 19 (Reuters) -Security experts said CrowdStrike's CRWD.O routine update of its widely used cybersecurity software, which caused clients' computer systems to crash globally on Friday, apparently did not undergo adequate quality checks before it was deployed.

The latest version of its Falcon Sensor software was meant make CrowdStrike clients' systems more secure against hacking by updating the threats it defends against. But faulty code in the update files resulted in one of the most widespread tech outages in recent years for companies using Microsoft's MSFT.O Windows operating system.

Global banks, airlines, hospitals and government offices were disrupted. CrowdStrike released information to fix affected systems, but experts said getting them back online would take time as it required manually weeding out the flawed code.

"What it looks like is, potentially, the vetting or the sandboxing they do when they look at code, maybe somehow this file was not included in that or slipped through," said Steve Cobb, chief security officer at Security Scorecard, which also had some systems impacted by the issue.

Problems came to light quickly after the update was rolled out on Friday, and users posted pictures on social media of computers with blue screens displaying error messages. These are known in the industry as "blue screens of death."

Patrick Wardle, a security researcher who specialises in studying threats against operating systems, said his analysis identified the code responsible for the outage.

The update's problem was "in a file that contains either configuration information or signatures," he said. Such signatures are code that detects specific types of malicious code or malware.

"It's very common that security products update their signatures, like once a day... because they're continually monitoring for new malware and because they want to make sure that their customers are protected from the latest threats," he said.

The frequency of updates "is probably the reason why (CrowdStrike) didn't test it as much," he said.

It's unclear how that faulty code got into the update and why it wasn't detected before being released to customers.

"Ideally, this would have been rolled out to a limited pool first," said John Hammond, principal security researcher at Huntress Labs. "That is a safer approach to avoid a big mess like this."

Other security companies have had similar episodes in the past. McAfee's buggy antivirus update in 2010 stalled hundreds of thousands of computers.

But the global impact of this outage reflects CrowdStrike's dominance. Over half of Fortune 500 companies and many government bodies such as the top U.S. cybersecurity agency itself, the Cybersecurity and Infrastructure Security Agency, use the company's software.



Reporting by Zeba Siddiqui in San Francisco; Editing by Cynthia Osterman

</body></html>

Disclaimer: Ang mga kabilang sa XM Group ay nagbibigay lang ng serbisyo sa pagpapatupad at pag-access sa aming Online Trading Facility, kung saan pinapahintulutan nito ang pagtingin at/o paggamit sa nilalaman na makikita sa website o sa pamamagitan nito, at walang layuning palitan o palawigin ito, at hindi din ito papalitan o papalawigin. Ang naturang pag-access at paggamit ay palaging alinsunod sa: (i) Mga Tuntunin at Kundisyon; (ii) Mga Babala sa Risk; at (iii) Kabuuang Disclaimer. Kaya naman ang naturang nilalaman ay ituturing na pangkalahatang impormasyon lamang. Mangyaring isaalang-alang na ang mga nilalaman ng aming Online Trading Facility ay hindi paglikom, o alok, para magsagawa ng anumang transaksyon sa mga pinansyal na market. Ang pag-trade sa alinmang pinansyal na market ay nagtataglay ng mataas na lebel ng risk sa iyong kapital.

Lahat ng materyales na nakalathala sa aming Online Trading Facility ay nakalaan para sa layuning edukasyonal/pang-impormasyon lamang at hindi naglalaman – at hindi dapat ituring bilang naglalaman – ng payo at rekomendasyon na pangpinansyal, tungkol sa buwis sa pag-i-invest, o pang-trade, o tala ng aming presyo sa pag-trade, o alok para sa, o paglikom ng, transaksyon sa alinmang pinansyal na instrument o hindi ginustong pinansyal na promosyon.

Sa anumang nilalaman na galing sa ikatlong partido, pati na ang mga nilalaman na inihanda ng XM, ang mga naturang opinyon, balita, pananaliksik, pag-analisa, presyo, ibang impormasyon o link sa ibang mga site na makikita sa website na ito ay ibibigay tulad ng nandoon, bilang pangkalahatang komentaryo sa market at hindi ito nagtataglay ng payo sa pag-i-invest. Kung ang alinmang nilalaman nito ay itinuring bilang pananaliksik sa pag-i-invest, kailangan mong isaalang-alang at tanggapin na hindi ito inilaan at inihanda alinsunod sa mga legal na pangangailangan na idinisenyo para maisulong ang pagsasarili ng pananaliksik sa pag-i-invest, at dahil dito ituturing ito na komunikasyon sa marketing sa ilalim ng mga kaugnay na batas at regulasyon. Mangyaring siguruhin na nabasa at naintindihan mo ang aming Notipikasyon sa Hindi Independyenteng Pananaliksik sa Pag-i-invest at Babala sa Risk na may kinalaman sa impormasyong nakalagay sa itaas, na maa-access dito.

Babala sa Risk: Maaaring malugi ang iyong kapital. Maaaring hindi nababagay sa lahat ang mga produktong naka-leverage. Mangyaring isaalang-alang ang aming Pahayag sa Risk.