Global IT Outage

When the competitors who are on the cloud started eating to their market foot print, every body has to jump in. Those companies that can withstand the pressure, were lured into it with cheap storage.
The same pattern/lesson repeats under a different angle:
  • lured into <A>
  • for reason <B>
  • under the threat of <C>
  • and ultimately sacrificing <D>.
One day, the control pyramid will come crashing down and it won't be pretty.
One thing is sure: the DCM gives plenty of warnings!
 
Just a quick reminder - Crowdstrike where the ones that claimed Russia hacked the DNC servers.

From the article:
Something stinks here, and the FBI needs to be held to account.
Some day, and with other issues, I guess.

On the other hand, I do think that this Crowdstrike/Microsoft issue might be a cover for something else as Clandestine mentions.

Reminder, Crowdstrike was the cybersecurity company that the DNC hired to frame Russia for the hacked DNC emails released by Julian Assange via Wikileaks.

Flashback to October 2016, when MSM/Hollywood were trying to establish the Russia narrative. Crowdstrike was one of the main entities that created the Russia hoax, and thus guilty of treason against Donald J Trump.

I don’t know what’s going on with Crowdstrike today, all we know is that they are at the epicenter of the ongoing shadow war. Something is going on behind the scenes.

What’s Assange up to right now? 👀
 
I'm still mitigating issues. This was one of my biggest concerns with a SIEM system at my company. It gives unsupervised access to ALL machines on the network in order to keep them safe. However, as has happened before, if a SIEM company is compromised that gives anyone access to multiple networks all at once. In this case, something internal occurred that pushed a poison update. Linux systems were not affected thankfully.
 
Cover for installing/setting up something to stage-manage the collapse of global financial markets, which are all, of course, computer-based?

It would be interesting to ask the C's about these cyber security companies and how many of them are in cahoots with either CIA/NSA, dark government entities or dark consortium entities. Most of these cyber security companies get their software installed into everything when a business purchases their services, network equipment, servers (Linux and Windows), workstations (Linux, Apple, and Windows), Cloud Servers, vCenters, etc. Many of the softwares are installed as kernel drivers hooked right into the OS, perfect backdoor access.

I also wonder how many of the dark hacker groups are tied into or controlled by dark government entities or dark consortium entities. Blacksuit and many hacker groups are going wild attacking large corporations. If the corporation does not have heavyweight cyber security they immediately contact Crowdstrike or Palo Alto Networks or the like and install these softwares on all systems and network devices. It seems like the perfect setup, infiltrate the corporation, setup a command center, secretly encrypt all the target devices in a company, ask for ransom. Boom the attacked company contacts one of these heavy weight cyber security companies and the cyber security software is installed everywhere - complete access and control.
 
Interesting post/thread.

While it may have been a "simple" code error, from what I could understand, they sent a square-shaped code to fit in a circle.
And without verifying what it could happen.

Apart from the facts of Crowdstrike with DNS.... I also add the huge amount of people who were injected and may have cognitive/brain problems without knowing it, have you noticed that injected people behave dispersed? Confused? Change in behavior?...
So it can be either error/accident or on purpose - trial and error, for whatever.

 
Interesting post/thread.

While it may have been a "simple" code error, from what I could understand, they sent a square-shaped code to fit in a circle.
And without verifying what it could happen.

Apart from the facts of Crowdstrike with DNS.... I also add the huge amount of people who were injected and may have cognitive/brain problems without knowing it, have you noticed that injected people behave dispersed? Confused? Change in behavior?...
So it can be either error/accident or on purpose - trial and error, for whatever.





I have seen people moving the code like this , but that is at one individual server level in one company( out of thousands of server). Few years back, some body coded as rm *.* ( remove) with a variable directory path. But the variable path didn't got resolved ( so it became root directory) and admin executed as it got approval from every body (testing team to Manager to director and so on). It got successfully executed and the ticket closed. Well, until some body said all application on the server were gone.

But this is not a local server level. not even company level, it is damn world wide operating system level.

Whom to Blame? or Blame game


snapback on DEI is understandable. though the real problem is


Solution?

Stop trusting any thing. crowdstrike and DEI are done with this incident.
 
It would be interesting to ask the C's about these cyber security companies and how many of them are in cahoots with either CIA/NSA, dark government entities or dark consortium entities. Most of these cyber security companies get their software installed into everything when a business purchases their services, network equipment, servers (Linux and Windows), workstations (Linux, Apple, and Windows), Cloud Servers, vCenters, etc. Many of the softwares are installed as kernel drivers hooked right into the OS, perfect backdoor access.

I also wonder how many of the dark hacker groups are tied into or controlled by dark government entities or dark consortium entities. Blacksuit and many hacker groups are going wild attacking large corporations. If the corporation does not have heavyweight cyber security they immediately contact Crowdstrike or Palo Alto Networks or the like and install these softwares on all systems and network devices. It seems like the perfect setup, infiltrate the corporation, setup a command center, secretly encrypt all the target devices in a company, ask for ransom. Boom the attacked company contacts one of these heavy weight cyber security companies and the cyber security software is installed everywhere - complete access and control.
the usual suspects... tentacles of the octupus

 
Well, I have spent my best part of Saturday fixing the mess Crowdstrike has created at our workplace and we still have dead machines out there with BSOD, which will take time to resolve.

Crowdstrike (CS), if I recall was started by people involved in the NSA tech back in the day when they were caught recording internet data and phone conversations etc - this was leaked by Edward Snowden. They have built the platform using similar IP and its quite an invasive peice of software. There is an Idendity module which reads Active Directory password hashes for comparison against rainbow tables and cracked password databases. Active Directory is used by a lot of businesses out there. The idea being that it will prompt you if you set a password which is easy to crack or has been cracked.

But, a malicious actor can launch a supply chain attack via CS, and read the password hashes of every single employee working for companies using CS with identity module enabled. Once you have the hashes, it doesn’t take long to extract the passwords from them using a modern computer. The disruption alone this could cause is huge, forget the ransom amount they would ask.

But, as someone commented, software like this will continue to make in-roads at workplaces, offering greater centralised control in the hands of the few. That is the true purpose of cloud computing and the push to move everyone to use it for running their business.

On this particular incident, it smells more like incompetence and not so much intentional cyber-attack. Even the MSM was a bit slow to wake up to it, from what I have observed so, it doesn’t appear to be staged, at least not just yet. Fwiw
 

Trending content

Back
Top Bottom