July 21, 2024
July 21, 2024
Microsoft on CrowdStrike-related outage: About 8.5 million Windows devices were affected by faulty Falcon update, or less than 1% of Windows machines on planet. https://t.co/SYF61BIk9w
— Sean Lyngaas (@snlyngaas) July 20, 2024
This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n pic.twitter.com/Lt4VfCs15s
— Tavis Ormandy (@taviso) July 20, 2024
Thread by @taviso on Thread Reader App – Thread Reader App
@taviso: This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"?...…
Using /proc/mem instead of ptrace to injecto code into a processhttps://t.co/W75rnwYur2
— 0xor0ne (@0xor0ne) July 20, 2024
Credits @erfur_qwe#infosec pic.twitter.com/OabYChHbkS
I thought this would be an interesting interview about clever tricks used to track down leakers. Instead the leakers are found because they use the same handle for their email, their accounts, and the accounts that leak. Or they are part of a small group and have taken no measures to sanitise the content they leak.
https://www.bloomberg.com/news/newsletters/2024-07-12/former-bungie-pokemon-lawyer-explains-how-they-caught-leakersJob 1 in repairing CrowdStrike.. get access to computer. https://t.co/zHsl0zw2Tq pic.twitter.com/g8tNIK42s4
— techAU (@techAU) July 21, 2024
Ok...so it begins...all hands on Deck...that's just 120 of 2000 #BSOD #laptop #crowdstrike #patching pic.twitter.com/10pEt0CXqa
— Dunken K Bliths✌️ (@DunkenKBliths) July 21, 2024
Cobalt Strike, in its release 3 days ago, implemented a new named pipes function. This could be the 'signature' they (@CrowdStrike) tried to deploy: https://t.co/1OUhooDkYc #cobaltstrike #Crowdstrike pic.twitter.com/j0M70lKXi6
— ⚡️Bitdos.eth⚡️ (@twaldos) July 20, 2024