37 votes

CrowdStrike estimates the tech meltdown caused by its bungling left a $60 million dent in its sales

20 comments

  1. [4]
    Aerrol
    Link
    I'm shocked it's not higher. I can't imagine ever wanting to use a company that bungled things this badly ever again.

    I'm shocked it's not higher. I can't imagine ever wanting to use a company that bungled things this badly ever again.

    30 votes
    1. krellor
      Link Parent
      This is specifically looking at contracts they were in the process of closing on. There may be others who choose not to renew in the next one or two cycles, though that has costs and they would...

      This is specifically looking at contracts they were in the process of closing on. There may be others who choose not to renew in the next one or two cycles, though that has costs and they would need to identify a replacement.

      Most companies also try and maintain an accounting of "goodwill" which is basically rolling up brand recognition, trust, and other intangible reputational assets. Those assets are surely heavily discounted due to this.

      16 votes
    2. [2]
      conception
      Link Parent
      There was definitely a vibe on Reddit that is still the best company at what it does. Also changing a software vendor, especially if you have 100k+ computers has its own cost involved.

      There was definitely a vibe on Reddit that is still the best company at what it does. Also changing a software vendor, especially if you have 100k+ computers has its own cost involved.

      6 votes
      1. Omnicrola
        Link Parent
        I don't know how many endpoints at my work are using Crowdstrike, but it's definitely in the 10s of thousands. The water cooler chat is that there are plans already being enacted to move away from...

        I don't know how many endpoints at my work are using Crowdstrike, but it's definitely in the 10s of thousands. The water cooler chat is that there are plans already being enacted to move away from CS over the next few years.

        5 votes
  2. [8]
    gil
    Link
    I still can't process that not a single person tested this updated before they published it. No manual tests, not automated, nothing. I know developer are lazy, mistakes happen, I'm a dev. That's...

    I still can't process that not a single person tested this updated before they published it. No manual tests, not automated, nothing. I know developer are lazy, mistakes happen, I'm a dev. That's why we have automation and processes in place to prevent this kind of thing. Especially considering how critical their products are, this sounds super amateurish.

    14 votes
    1. [7]
      sparkle
      Link Parent
      I can't speak with 100% certainty, but I thought I had read/heard that it did pass initial QA testing but something in their release pipeline caused the channel file to be nulled out which was...

      I can't speak with 100% certainty, but I thought I had read/heard that it did pass initial QA testing but something in their release pipeline caused the channel file to be nulled out which was what led to the meltdown.

      Still doesn't excuse not testing the release package before pressing the "upload to all customers" button. We have sanity checks for a reason lol. Complacency is the enemy of sanity and sounds like there is some rot in the company that needs to be worked out

      3 votes
      1. [3]
        Eji1700
        Link Parent
        The biggest failure is that there's an "upload to all customers" button, at all. For the level of business they do, they ABSOLUTELY should have a slow and phased deployment plan for all changes....

        The biggest failure is that there's an "upload to all customers" button, at all.

        For the level of business they do, they ABSOLUTELY should have a slow and phased deployment plan for all changes. Something like 10% of customers, wait a day, 20%, wait a few days, 50%, wait, 100%.

        This is basics for any large level deployment, let alone across such a multitude of configurations and languages.

        12 votes
        1. [2]
          Landhund
          Link Parent
          Ehh, considering they are providing security software/services, there is some justification for system of immediate release to all clients should there be an severe security risk that needs to be...

          Ehh, considering they are providing security software/services, there is some justification for system of immediate release to all clients should there be an severe security risk that needs to be addressed as quickly as possible.

          3 votes
          1. Eji1700
            Link Parent
            Not really? Even in those supposed cases they are the vast minority, not the standard, and should be required to be flagged as such and go through extra review. Even still a deployment plan needs...

            Not really?

            Even in those supposed cases they are the vast minority, not the standard, and should be required to be flagged as such and go through extra review.

            Even still a deployment plan needs to be in place that doesn't just hit all customer systems at once because the last thing you want to do is exactly what they did. Even if this was patching some 0 day, if the outcome is the same, congrats you've probably done more damage than it ever would have if you rolled out over 3 days.

            10 votes
      2. [2]
        sparksbet
        Link Parent
        According to Crowdstrike, the null file wasn't the problem directly (idk if we've been updated on where the actual source of the error was according to them). In their report after the disaster,...

        I can't speak with 100% certainty, but I thought I had read/heard that it did pass initial QA testing but something in their release pipeline caused the channel file to be nulled out which was what led to the meltdown.

        According to Crowdstrike, the null file wasn't the problem directly (idk if we've been updated on where the actual source of the error was according to them). In their report after the disaster, they said that the update passed a recently-implemented automated test, but a bug in the test caused it to pass despite the problem. They definitely did not have manual QA testing of this update prior to the release.

        6 votes
        1. sparkle
          Link Parent
          Ah ok that makes much more sense. I haven't read their RCA yet (if it's been released to the public), just the few pieces that I picked up here and there from various people more involved than I...

          Ah ok that makes much more sense. I haven't read their RCA yet (if it's been released to the public), just the few pieces that I picked up here and there from various people more involved than I in the week after the meltdown.

          Thank you for the correction/information, fellow spark :)

          2 votes
      3. gil
        Link Parent
        If I understood their Preliminary Post Incident Review (PIR) correctly, they said they will implement all kinds of testing, including "Local developer testing" that I assume is asking their devs...

        If I understood their Preliminary Post Incident Review (PIR) correctly, they said they will implement all kinds of testing, including "Local developer testing" that I assume is asking their devs to test it. They published later the full report but I haven't read it. IIRC they only had automated testing to check the format of the file, but that failed.

        2 votes
  3. [3]
    guissmo
    Link
    Anyone have a mirror? Content is not available in my region apparently. :(

    Anyone have a mirror? Content is not available in my region apparently. :(

    4 votes
  4. [5]
    tauon
    Link
    Wow, it’s been a few years since I’ve last encountered a site with such blatant non-compliance with regard to (EU) GDPR…

    This content is not available in your region

    Wow, it’s been a few years since I’ve last encountered a site with such blatant non-compliance with regard to (EU) GDPR…

    3 votes
    1. [3]
      creesch
      Link Parent
      Semantic nitpick, they are actually fully compliant by not doing business in the EU and actively blocking people from there. Likely privacy violating assholes for anyone outside the EU, but GDPR...

      Semantic nitpick, they are actually fully compliant by not doing business in the EU and actively blocking people from there.

      Likely privacy violating assholes for anyone outside the EU, but GDPR compliant assholes nonetheless.

      13 votes
      1. GLaDYS
        Link Parent
        Many GDPR provisions do cover EU citizens living abroad, so geoblocking is not a way to be "fully compliant" with it. It's wishful thinking.

        Many GDPR provisions do cover EU citizens living abroad, so geoblocking is not a way to be "fully compliant" with it. It's wishful thinking.

        2 votes
      2. tauon
        Link Parent
        They wouldn’t be compliant if they were to offer their site in the European Economic Area, which is what I meant. But obviously, they can stay compliant by blocking an entire region, you’re right...

        They wouldn’t be compliant if they were to offer their site in the European Economic Area, which is what I meant.
        But obviously, they can stay compliant by blocking an entire region, you’re right in that. (;