美國居民不適用 XM 服務。

CrowdStrike update that caused global outage likely skipped checks, experts say



<html xmlns="http://www.w3.org/1999/xhtml"><head><title>CrowdStrike update that caused global outage likely skipped checks, experts say</title></head><body>

By Zeba Siddiqui

SAN FRANCISCO, July 19 (Reuters) -Security experts said CrowdStrike's CRWD.O routine update of its widely used cybersecurity software, which caused clients' computer systems to crash globally on Friday, apparently did not undergo adequate quality checks before it was deployed.

The latest version of its Falcon Sensor software was meant make CrowdStrike clients' systems more secure against hacking by updating the threats it defends against. But faulty code in the update files resulted in one of the most widespread tech outages in recent years for companies using Microsoft's MSFT.O Windows operating system.

Global banks, airlines, hospitals and government offices were disrupted. CrowdStrike released information to fix affected systems, but experts said getting them back online would take time as it required manually weeding out the flawed code.

"What it looks like is, potentially, the vetting or the sandboxing they do when they look at code, maybe somehow this file was not included in that or slipped through," said Steve Cobb, chief security officer at Security Scorecard, which also had some systems impacted by the issue.

Problems came to light quickly after the update was rolled out on Friday, and users posted pictures on social media of computers with blue screens displaying error messages. These are known in the industry as "blue screens of death."

Patrick Wardle, a security researcher who specialises in studying threats against operating systems, said his analysis identified the code responsible for the outage.

The update's problem was "in a file that contains either configuration information or signatures," he said. Such signatures are code that detects specific types of malicious code or malware.

"It's very common that security products update their signatures, like once a day... because they're continually monitoring for new malware and because they want to make sure that their customers are protected from the latest threats," he said.

The frequency of updates "is probably the reason why (CrowdStrike) didn't test it as much," he said.

It's unclear how that faulty code got into the update and why it wasn't detected before being released to customers.

"Ideally, this would have been rolled out to a limited pool first," said John Hammond, principal security researcher at Huntress Labs. "That is a safer approach to avoid a big mess like this."

Other security companies have had similar episodes in the past. McAfee's buggy antivirus update in 2010 stalled hundreds of thousands of computers.

But the global impact of this outage reflects CrowdStrike's dominance. Over half of Fortune 500 companies and many government bodies such as the top U.S. cybersecurity agency itself, the Cybersecurity and Infrastructure Security Agency, use the company's software.



Reporting by Zeba Siddiqui in San Francisco; Editing by Cynthia Osterman

</body></html>

免責聲明: XM Group提供線上交易平台的登入和執行服務,允許個人查看和/或使用網站所提供的內容,但不進行任何更改或擴展其服務和訪問權限,並受以下條款與條例約束:(i)條款與條例;(ii)風險提示;(iii)完全免責聲明。網站內部所提供的所有資訊,僅限於一般資訊用途。請注意,我們所有的線上交易平台內容並不構成,也不被視為進入金融市場交易的邀約或邀請 。金融市場交易會對您的投資帶來重大風險。

所有缐上交易平台所發佈的資料,僅適用於教育/資訊類用途,不包含也不應被視爲適用於金融、投資稅或交易相關諮詢和建議,或是交易價格紀錄,或是任何金融商品或非應邀途徑的金融相關優惠的交易邀約或邀請。

本網站的所有XM和第三方所提供的内容,包括意見、新聞、研究、分析、價格其他資訊和第三方網站鏈接,皆爲‘按原狀’,並作爲一般市場評論所提供,而非投資建議。請理解和接受,所有被歸類為投資研究範圍的相關内容,並非爲了促進投資研究獨立性,而根據法律要求所編寫,而是被視爲符合營銷傳播相關法律與法規所編寫的内容。請確保您已詳讀並完全理解我們的非獨立投資研究提示和風險提示資訊,相關詳情請點擊 這裡查看。

風險提示:您的資金存在風險。槓桿商品並不適合所有客戶。請詳細閱讀我們的風險聲明