BitDepthFeatured

The consequences of careless code

5 Mins read

Above: Illustration by Authorpolygraphus/DepositPhotos

BitDepth#1470 for August 05, 2024

On July 19, cybersecurity firm Crowdstrike sent an automatic update to Microsoft Windows computers that was intended to upgrade the Falcon sensor security solution it sells to enterprise.

The worst possible thing happened. A bug in the code sent the computers that received into a death spiral of blue screens. The update was just 40 kilobytes in size and was intended to adjust the sensor’s ability to detect malware.

Instead, it caused more than US$6 billion dollars in real world damage.
Delta Airlines alone, which deployed the software widely in its computer network, reported losses of more than US$500 million over the week it struggled to normalise operations after the Crowdstrike bug crippled the company’s ability to function.

Crowdstrike has since committed to improving local developer testing, content update and rollback testing, stress testing, fuzzing, and fault injection and to conduct stability and content interface testing.

Microsoft estimates that more than eight million Windows computers were affected by the bug. Crowdstrike quickly deployed a patch that corrected the issue, but for many customers, it fixed nothing, at least not right away.

Falcon is an endpoint sensor widely used in computers that run systems like automated kiosks and customer interface panels that were also secured by Microsoft’s BitLocker encryption software.

On those computers, it was necessary to decrypt the hardware, apply the patch then restart. Roughly 20 minutes of work, multiplied by hundreds of devices.
Delta’s long path to restoring operations was apparently compounded by outsourced IT, which meant fewer people available to “touch” stricken computers.

Trinidad and Tobago was largely unscathed by the incident (https://cstu.io/36e5d9), and most organisations affected by the bug reported resumption of transactions within 24 hours.

“Do I think that TT dodged a bullet because Crowdstrike is expensive? Yes,” said cybersecurity specialist Shiva Parasram.

“The fact that Crowdstrike is very popular but very expensive might be one of the factors limiting its impact in Trinidad.”

Shiva Parasram

“But it’s not necessarily a good thing. The reason why there was minimal impact is because that we don’t really spend much on cybersecurity.”

“I don’t think that cost was the determining factor why CrowdStrike is not as popular locally,” said Anthony Peyson, president of the Caribbean Chapter of the International Information System Security Certification Consortium.

“Traditionally, we are generally slow to replace older software systems and adopt newer ones like CrowdStrike.”

The cruel reality of Crowdstrike is that it wasn’t a cybersecurity attack. It was a quality of service lapse and the incident puts IT professionals in an odd space, sandwiched between determined and sustained attacks by hackers and ransomware organisations and hastily deployed software that ends up fragging their systems from the inside.

Do IT pros do all recommended updates as they are issued and risk buggy updates like Crowdstrike?

Do they wait a few days and risk compromise because of outdated security measures or unplugged security holes?

Do they create a sandboxed update system to confirm that updates are safe? If so, how practical would that be for typically underpaid, overworked local IT teams?

“Most IT professionals are concerned with service delivery, which means that they are focused on ensuring that services remain accessible to all those who need to use them,” Peyson said.

“In this fast-paced environment, most IT professionals set systems to update automatically. It becomes one less thing to worry about. Best practice suggests that IT professionals use a sandbox or a lab to test updates on a small number of systems before deploying them to the wider network.”

“In practice, this is not considered practical and is another layer of complexity that requires resources which include people, time and money. Having a local IT workforce which is generally overworked, underpaid and not respected adds fuel to the fire. This situation creates an environment here the standard IT professional speeds through tasks without exercising due care or diligence.”

Parasram believes that sandboxed test systems to confirm updates are something that companies will have to build into their IT management.
“It’s not going to get any easier for TT,” he said.

“But we have a lot more graduates coming out, new professionals who are looking for a start. Companies will have to get serious about disaster recovery and that includes cloud service providers and software as a service.”

“Companies have to do third-party risk assessments on these businesses, ensure that they are certified, that they have qualified teams, that they are on the ground. What is their response time [when disaster strikes]?”

“People don’t take on service level agreements, but you have to look at how much downtime and uptime are guaranteed and if it’s not provided, you are due compensation. Service level agreements and contracts have to be studied quite carefully to ensure that these critical services are supplied.”

As the immediacy of Crowdstrike disruptions gave way to analysis of the incident, talk of legal liability began to surface.

Unsurprisingly from Delta, but also from Malaysia, whose digital minister pointed out that five government agencies and nine Malaysian companies in aviation, banking and healthcare were affected.

What should Trinidad and Tobago take away from the Crowdstrike bug?
Top of the list is that businesses and government agencies are responsible for the sanctity of their computer systems and every business decision should be predicated on maximising cybersecurity.

Contingency planning must be thorough, exhaustive and well-exercised.
When systems fail, customers and the public don’t actually care and often don’t understand distributed responsibilities, so blaming other companies and services is always going to fall flat.

Everyone knew that a company called Crowdstrike was responsible for service outages, but Delta had to deal with tens of thousands of customers who are still venting on Reddit about their experiences.

A mother travelling with two tired children really doesn’t want to know anything about some other company and some digital problem when they can’t board their flight.

Anthony Peyson. Photo by Abraham Holder, courtesy ISC2

“Organisations are playing Russian roulette if they are operating without a business continuity plan,” said Peyson.

“There is a high dependence by local organisations on third-party vendors like Microsoft and CrowdStrike. Microsoft has suffered major outages over the past couple of weeks and this has affected more local companies than the CrowdStrike outage.”

“The problem is the same, the overall impact due to the dependency on these vendors remains unknown to most organisations and therefore they are unaware of how much risk they are exposed to when these vendor services are disrupted. What will happen if we suffer a national internet outage?”

“The impact is expected to be devastating however we have no idea how much damage organisations will suffer if such an event occurs today.”

While TT customers have a high tolerance for service abuse, they should not be expected to offer eternal grace for digital failures.

TSTT weathered the humiliation of having private customer information exposed on the dark web and later the open internet by offering its CEO and CFO as symbolic public sacrifice.

iGovTT managed to escape public opprobrium after its proud achievement, TTConnect, simply disappeared for months.

With no legal requirement to notify anyone of cybersecurity breaches, other exposures of personally identifiable information remain largely unknown.

What we don’t know can, in fact, hurt us.

Why cash is king in Trinidad and Tobago

Why cash is king in Trinidad and Tobago

In 2017, 16 per cent of users owned a credit card, a figure that dropped to 15 per cent by 2023.
Read More
I shopped at Temu!

I shopped at Temu!

Temu is great fun to explore and offers many bargains but product quality can be wildly variable.
Read More
What’s needed to make e-Governance happen?

What’s needed to make e-Governance happen?

“If we look at successful governments that have achieved a certain level in of success in these programs, some things stand out."
Read More
Changing the education conversation

Changing the education conversation

There are local schools that aspire to continuous improvement and others that struggle to make it through a working day without bloodshed.
Read More
Practical steps to reducing cybersecurity risks

Practical steps to reducing cybersecurity risks

The process, to be effective, must be ongoing and managed to ensure that vendors meet required standards.
Read More
The consequences of careless code

The consequences of careless code

The cruel reality of Crowdstrike is that it wasn't a cybersecurity attack. It was a quality of service lapse and the incident puts IT professionals in an odd space.
Read More
What leaders are doing to enable digital transformation

What leaders are doing to enable digital transformation

If people in your organisation are coming to you, telling you we need to change these things, you really should listen.
Read More
Apple’s photography workflow

Apple’s photography workflow

Every Apple device has a Photos database and every image that's taken with a mobile iOS device or imported into the desktop Photos app gets added to it.
Read More
An apathy of cybersecurity concerns

An apathy of cybersecurity concerns

It's weird when a definitive statement about the importance of cybersecurity comes from the people who broke into your digital house.
Read More
Putting data to work to improve perception

Putting data to work to improve perception

When it comes to the data, the numbers are there, but it also has to work alongside your goals.
Read More
The state of TT broadband, 2024

The state of TT broadband, 2024

In 2022, mobile internet penetration it had risen to 62.9 per 100 citizens, almost twice the penetration rate of fixed wireless.
Read More
Apple’s plan for device domination

Apple’s plan for device domination

Siri, at 13, gets an upgrade with Apple Intelligence, promising a significant upgrade on Siri’s smarts in a small language model that functions on device.
Read More
Adobe’s terms of disservice

Adobe’s terms of disservice

The activation servers for Adobe's CS, CS2 and CS3 products were shut down between 2013 and 2017. In May last year, Adobe stopped its customer support from deactivating perpetual licenses...
Read More
Going virtual with medical diagnosis

Going virtual with medical diagnosis

In developing its own OMNI artificial intelligence agent, Patient Connect is training the large language model locally on selected resources, including information from NGOs and care providers.
Read More
How the police became a media outlet

How the police became a media outlet

Former CoP Gary Griffith authorised an increase in the unit from four officers to 23 emphasising a direct engagement with the public using social media, with an emphasis on Facebook.
Read More
Microsoft ARMs up

Microsoft ARMs up

Since the company was founded, its OS and apps have been almost exclusively coded for chips manufactured by Intel.
Read More
Flexxon introduces silicon-level cybersecurity protection to TT

Flexxon introduces silicon-level cybersecurity protection to TT

Flexon began business in 2007 under the leadership of CEO Camellia Chan with a line of products that targeted niche industrial, medical, automotive and aerospace sectors before making a change...
Read More
Will the iPad Pro humble the Mac Pro?

Will the iPad Pro humble the Mac Pro?

A premium configuration of the M4 iPad Pro, which is clearly being positioned as a laptop replacement, costs US$2,700.
Read More
Question Mark’s Baptiste founds creative group, plans arts magazine

Question Mark’s Baptiste founds creative group, plans arts magazine

There are no real publications that speak to who we are as creatives, who we are in the world and really takes advantage of the IP [we create]
Read More
Post News is dead

Post News is dead

"At the end of the day, our service is not growing fast enough to become a real business or a significant platform."
Read More
Why cash is king in Trinidad and Tobago Why cash is king in Trinidad...
I shopped at Temu! I shopped at Temu!
What’s needed to make e-Governance happen? What’s needed to make e-Governance happen?
Changing the education conversation Changing the education conversation
Practical steps to reducing cybersecurity risks Practical steps to reducing cybersecurity risks
The consequences of careless code The consequences of careless code
What leaders are doing to enable digital transformation What leaders are doing to enable...
Apple’s photography workflow Apple’s photography workflow
An apathy of cybersecurity concerns An apathy of cybersecurity concerns
Putting data to work to improve perception Putting data to work to improve...
The state of TT broadband, 2024 The state of TT broadband, 2024
Apple’s plan for device domination Apple’s plan for device domination
Adobe’s terms of disservice Adobe’s terms of disservice
Going virtual with medical diagnosis Going virtual with medical diagnosis
How the police became a media outlet How the police became a media...
Microsoft ARMs up Microsoft ARMs up
Flexxon introduces silicon-level cybersecurity protection to TT Flexxon introduces silicon-level cybersecurity protection to...
Will the iPad Pro humble the Mac Pro? Will the iPad Pro humble the...
Question Mark’s Baptiste founds creative group, plans arts magazine Question Mark’s Baptiste founds creative group,...
Post News is dead Post News is dead

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

Practical steps to reducing cybersecurity risks

4 Mins read
The process, to be effective, must be ongoing and managed to ensure that vendors meet required standards.
FeaturedNews Briefs

The Crowdstrike bug's minimal impact on TT

2 Mins read
In statements, the Crowdstrike emphasised that the problem originated in a content update and was not a cyberattack or security breach.
BitDepthFeatured

An apathy of cybersecurity concerns

4 Mins read
It’s weird when a definitive statement about the importance of cybersecurity comes from the people who broke into your digital house.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
trackback
1 month ago

[…] Trinidad and Tobago – On July 19, cybersecurity firm Crowdstrike sent an automatic update to Microsoft Windows computers that was intended to upgrade the Falcon sensor security solution it sells to enterprise… more […]

×
FeaturedNews Briefs

The Crowdstrike bug's minimal impact on TT

1
0
Share your perspective in the comments!x
()
x