pwshub.com

Microsoft admits 8.5 million CrowdStruck machines was low

Microsoft has admitted that its estimate of 8.5 million machines crashed by CrowdStrike's faulty software update was almost certainly too low, and vowed to reduce infosec vendors' reliance on the kernel drivers at the heart of the issue.

Redmond posted an incident response blog on Saturday – titled "Windows Security best practices for integrating and managing security tools" – in which veep for enterprise and OS security David Weston explained how Microsoft measured the impact of the incident: by accessing crash reports shared by customers.

But of course, as Weston noted, not every Windows customer shares crash reports.

"It's worth noting the number of devices which generated crash reports is a subset of the number of impacted devices previously shared by Microsoft," he wrote. Which means the 8.5 million crashed machine estimate Redmond shared on July 20 for over a week was not entirely accurate. It was also advantageous to Microsoft, which was criticized for the fragility of its OS in the wake of the incident – especially in mainstream media, which often identified crashes caused by CrowdStrike as a Microsoft mess.

Weston's post justifies how Windows performed, on the grounds that kernel drivers like those employed by CrowdStrike can improve performance and prevent tampering with software in ways that enhance security.

He noted, however, that infosec vendors must rationalize those benefits against potential negative impacts on resilience.

"Since kernel drivers run at the most trusted level of Windows, where containment and recovery capabilities are by nature constrained, security vendors must carefully balance needs like visibility and tamper resistance with the risk of operating within kernel mode," he wrote.

Weston observed that security vendors can find the right balance.

"For example, security vendors can use minimal sensors that run in kernel mode for data collection and enforcement, limiting exposure to availability issues," he wrote. "The remainder of the key product functionality includes managing updates, parsing content, and other operations can occur isolated within user mode where recoverability is possible."

That arrangement, he suggested, "demonstrates the best practice of minimizing kernel usage while still maintaining a robust security posture and strong visibility."

Are you taking notes, CrowdStrike?

  • CrowdStrike meets Murphy's Law: Anything that can go wrong will
  • CrowdStrike update blunder may cost world billions – and insurance ain't covering it all
  • Windows Patch Tuesday update might send a user to the BitLocker recovery screen
  • How a cheap barcode scanner helped fix CrowdStrike'd Windows PCs in a flash

Weston also reminded readers that Redmond runs an industry forum called the Microsoft Virus Initiative (MVI) in which security vendors and the OS giant work together to "define reliable extension points and platform improvements, as well as share information about how to best protect our customers."

The Microsoft veep listed the many security-related enhancements Microsoft has made over the years, and revealed the software megalith now plans "to work with the anti-malware ecosystem to take advantage of these integrated features to modernize their approach, helping to support and even increase security along with reliability."

That work will involve four efforts, namely:

  1. Providing safe rollout guidance, best practices, and technologies to make it safer to perform updates to security products;
  2. Reducing the need for kernel drivers to access important security data;
  3. Providing enhanced isolation and anti-tampering capabilities with technologies like recently announced VBS enclaves;
  4. Enabling zero trust approaches like high integrity attestation which provides a method to determine the security state of the machine based on the health of Windows native security features.

Point two seems aimed at ensuring a CrowdStrike-like event becomes less likely in future.

Weston didn't explain how that reduced dependence will be delivered – some re-jigging of Windows will likely be needed to make it happen.

Microsoft and Windows have a long and inglorious history of security snafus. If Redmond's changes go awry, it won't have CrowdStrike to blame for any new problems. ®

Source: theregister.com

Related stories
1 month ago - falcon punch — Kernel access gives security software a lot of power, but not without problems. ...
2 weeks ago - VP Adam Meyers to testify about that faulty software update which ruined July and some of August Crowdstrike is to be hauled before the US House Homeland Security Committee this month to explain why its faulty software update - the one...
1 month ago - PSA: Only accept updates via official channels ... ironically enough CrowdStrike is the latest lure being used to trick Windows users into downloading and running the notorious Lumma infostealing malware, according to the security shop's...
2 weeks ago - The setback won't stop us from banking billions, CFO insists Nvidia has confirmed earlier reports that its Blackwell generation of GPUs suffered from a design defect that adversely impacted the yields of the hotly anticipated accelerators.…
1 week ago - CISA wants you to leap on Citrix and Ivanti issues. Adobe, Intel, SAP also bid for patching priorities Patch Tuesday Another Patch Tuesday has dawned, as usual with the unpleasant news that there are pressing security weaknesses and...
Other stories
41 minutes ago - As an Amazon Prime member, not only do you get a free Grubhub+ membership, you can also score $10 off your first $15 order.
41 minutes ago - Amazon's second Prime Day event of 2024 is still a few weeks away, but there are some bargains you can score now.
41 minutes ago - YouTube will roll out a new generative AI video tool named Veo later this year that'll allow creators to create 6-second clips with nothing more...
2 hours ago - FBI Director hails successful action but calls it “just one round in a much longer fight.”
2 hours ago - SocialAI takes the social media "filter bubble" to an extreme with 100% fake interactions.