SANS NewsBites

CrowdStrike Update Causing Windows Crashes

July 19, 2024  |  Volume XXVI - Issue #54

Top of the News


2024-07-19

CrowdStrike Update Bug Causes Major Outages Worldwide

Last night (Thursday, July 18), endpoint security vendor CrowdStrike released an update that is causing Windows systems to crash. This is causing major disruptions worldwide. CrowdStrike released a brief public statement, and posted workarounds to its customer support portal. Recovery will require physical access to the system and manual intervention. This will likely be complicated by systems protected with BitLocker. So far, several airlines indicated that they halted operations this morning. Some 911 systems, banks and grocery store chains appear to be affected.

Editor's Note

This is a huge failure on CrowdStrike's part, akin to SolarWinds failure to protect their update process, albeit right now being attributed to their own error not to an attack. The end result for customers and the customers of customers is the same. Needing to slow-roll updates to security products because of quality concerns is like widening the bullseye for attackers.

John Pescatore
John Pescatore

The flawed update is impacting the Windows login service and may result in our old friend BSOD. The fix is to get the updated definition from CrowdStrike, which is problematic if your systems are crashed. As my wife and I sit here waiting for our flight we can't help but notice that 600 flights were delayed or cancelled. Banks are reporting issues processing transactions. Interesting supply chain compromise exercise. Take note of downstream recovery impacts which should be incorporated into your BC/DR plan.

Lee Neely
Lee Neely

This is not a quick fix. I can promise that, from talking to a few people working with Azure VMs, the fix will be pretty bad and fairly manual. I know of just one company with half its infrastructure (computers and servers) down; it will take days to recover. A couple of thoughts here: One is that now attackers know who is using what EDR, which will be bad. Two, how many of these people will be giving out the Local Administrator password so that you can get into a Windows Recovery remotely? At this point, you are very exposed and are trusting people not to do anything malicious. It isn't good. Be kind to people.

Moses Frost
Moses Frost

The events of today highlight the importance of regulations such as the EU NIS2 Directive and EU DORA in ensuring organisations are taking the appropriate steps to manage cyber risk within their own organisations and just as importantly within their supply chain. While CrowdStrike have issued workarounds and fixes to the issue, in many cases it requires manual intervention to each individually impacted device which could lead to a long recovery time from this problem. Organisations will need to prioritise the systems that are most critical to their business and recover them in order of priority. Questions need to be asked of CrowdStrike as to what went wrong with their testing and quality assurance processes to ensure there was no impact on their customers and what they are going to do to ensure there is no repeat of today's issue.

Brian Honan
Brian Honan

Single point of failure? When I was a development manager on an early 5000 user multi-application system, the rule was "If it ran yesterday, it must run today." This was about fall-back procedures that had to be built into every change. This is the second major outage in a year caused by a change.

William Hugh Murray
William Hugh Murray

It might make sense to consider this a friendly ransomware incident and revisit roads to resilience in the face of compromise. "What does continuity and recovery look like here for our organization?"

Gal Shpantzer
Gal Shpantzer

The Rest of the Week's News


2024-07-18

UnitedHealth Group Updates Projected Costs Associated with Change Healthcare Ransomware Attack

Change Healthcare parent company UnitedHealth Group (UHG) now expects costs incurred due to the Change Healthcare ransomware attack earlier this year to be between $2.3 billion and $2.45 billion, which $1 billion higher than previous estimates. As of June 30, UHG has spent nearly $2 billion in associated costs, which includes restoring Change Healthcare systems. Change health care plans to start sending notification letters to affected individuals on July 20.

Editor's Note

That is roughly $100 of cost against revenue from each of UHCÕs roughly 27M US customers, and the actual total will surely be higher. The cause: from UHCÕs CEO during his 'perp walk' in front of Congress: Change Healthcare was a relatively older company with older technologies, which we had been working to upgrade since the acquisition. But for some reason, which we continue to investigate, this particular server did not have MFA on it. Convince your management you need to avoid a similar expensive, avoidable 'but for some reason' incident.

John Pescatore
John Pescatore

A lot of lessons learned here that are applicable to other companies. Not only the eye-popping costs of the cyber incident but its root cause. Bottomline, cybersecurity should be a critical component as part of merger/acquisition due diligence.

Curtis Dukes
Curtis Dukes

Management is fundamentally under-estimating both threat and consequences of breaches. These risk acceptance decisions are putting the health and the life of the enterprise at risk. Moreover, as in this case and the CDK case, much of the cost is borne, not just by the enterprise itself, but by its customers and their constituents (e.g. auto dealer employees' compensation that is tied to efficiency.) It is essential to get the basics right. We have a duty; lead or get out of the way.

William Hugh Murray
William Hugh Murray

2024-07-17

Oracle Critical Patch Update Advisory for July 2024

Oracle's critical patch update for July 2024 addresses nearly 400 security issues affecting Oracle and third party components used in Oracle products. Ninety-five of the fixes address vulnerabilities in Oracle Communications; 60 address issues in Financial Services Applications; Fusion Middleware received 41 patches; and MySQL received 37.

Editor's Note

If you have downtime due to CrowdStrike's disastrous update, sneak in the Oracle CPU updates while systems are down everywhere. That Oracle financial software is installed in a lot of places where it hasn't been used in years.

John Pescatore
John Pescatore

Don't let the volume of updates scare you off. There are a lot of products here and you're likely only using a subset of these products. Even so make sure you're doing regression testing, particularly with middleware updates.

Lee Neely
Lee Neely

2024-07-18

Windows Update Delivery Changes

Microsoft is introducing checkpoint cumulative updates for Windows 11. The program is currently available only to beta testers; Microsoft expects that by the end of this calendar year, the service will begin to roll out for devices running Windows 11, version 24H2 or later, as well as Windows Server 2025.

Editor's Note

There are definite advantages to using this approach on Windows 11 laptops but given Microsoft's loss of focus on security in recent years, being an early adopter carries risks. I'd like to believe that smaller update packages will then enable Microsoft to move forward with faster than monthly patching.

John Pescatore
John Pescatore

Today, the updates, like 23H2, include all the updates since the OS was released. This model is that the update will only contain the delta since the last update which will make them smaller and faster to deploy. This also means you need to apply all the updates in order rather than a single update to catch up. With that process sorted this should lesson the burden of updates which will be a win for users who will have a smaller impact window.

Lee Neely
Lee Neely

2024-07-18

Cisco Releases Patches for Two Critical Vulnerabilities

Among the security issues addressed by Cisco earlier this week are two critical vulnerabilities. A password change vulnerability (CVE-2024-20419) affects Cisco Smart Software Manager (SSM) On-Prem authentication system. Older versions, known as SSM Satellite, are also affected. The vulnerability could be exploited with specially-crafted HTTP requests 'to access the web UI or API with the privileges of the compromised user.' Cisco also addressed a critical arbitrary file write vulnerability (CVE-2024-20401) in their Secure Email Gateway.

Editor's Note

A CVSS score of 10 basically says no privileges or user assistance is needed to exploit the vulnerability. Users of SSM should download and patch immediately, as evildoers are likely reverse engineering the patch and developing exploit code.

Curtis Dukes
Curtis Dukes

Cisco SSM is used to license software. If someone actually has this deployed internally, you can bet their infrastructure is massive.

Moses Frost
Moses Frost

2024-07-18

Meta Suspends Use of Generative AI in Brazil

Meta has suspended its use of generative AI (GenAI) in Brazil following after the country's government objected to Meta's privacy policy, which allows the company to access users' personal data to train their GenAI systems. Meta will talk with Brazil's National Data Protection Authority (ANPD), which has banned Meta from using Brazilians' personal data to train their AI. ANPD imposed the ban because of the imminent risk of serious harm and irreparable or difficult-to-repair damage to the fundamental rights of guardians.

Editor's Note

Do you have an AI security policy for your organization that addresses the need to keep customer and employee information safe from internal use of AI software? Don't forget the 2023 Microsoft AI exposure of 38TB of sensitive data, including over 30,000 internal teams messages.

John Pescatore
John Pescatore

GenAI requires large, diverse datasets in which to train its models. The collection and use come at a cost in user privacy. More needs to be done to explain what safeguards are in place to protect data used by these systems.

Curtis Dukes
Curtis Dukes

2024-07-18

SAP AI Core Vulnerabilities

Researchers from security firm Wiz discovered five vulnerabilities in SAP AI Core service. The flaws could be exploited to take control of the service and to access customer information. Wiz reported the flaws to SAP earlier this year; SAP released patches for the vulnerabilities in May. In their write-up of the flaws, Wiz says, 'The root cause of these issues was the ability for attackers to run malicious AI models and training procedures, which are essentially code. After reviewing several leading AI services, we believe the industry must improve its isolation and sandboxing standards when running AI models.'


2024-07-16

VA OIG: $665 Million in VA Revenue in Limbo Due to Suspended Program Integrity Tool

In February 2023, the US Department of Veterans Affairs (VA) suspended its use of a tool that helped the agency figure out billing claims from veterans receiving community care. According to a report from the VA Office of Inspector General (VA OIG), the Veterans Health Administration's (VHA's) Office of Integrity and Compliance, in collaboration with VA's Office of Information and Technology, made the decision to pause use of the tool after becoming aware of issues with its database code logic and of compromised stored data. The intent was to further evaluate the Program Integrity Tool's processes, data, documentation, and its underlying information technology system architecture, and to determine the cause of potential data errors and identify improvement opportunities. The VA's use of the tool has not yet resumed.

Editor's Note

The good news is the VA paused use of a flawed tool, the bad news is it is having a big impact on business processes. They now face the tough question of which is worse: the flaws or business impact. If they're lucky they can mitigate the flaws until a replacement can be deployed. If not, alternate procedures will need to be implemented to resume processing.

Lee Neely
Lee Neely

2024-07-17

Sophos State of Ransomware 2024 Report

According to data gathered and analyzed by Sophos, costs associated with ransomware attacks on critical national infrastructure organizations have climbed sharply: a year ago, the median ransomware payment was $62,500; this year the median payment is $2.54 million. Split out by industry, IT, tech, and telecommunications ransomware victims paid an average of $330,000, while victims in the education and government sectors paid average of $6.6 million. The report also indicates that ransomware recovery times for organizations in the energy, oil, and gas sectors are increasing. The data represent only organizations that were forthcoming about their experiences.