"Linux would have prevented this!" literally true because my former colleague KP Singh wrote a kernel security module that lets EDR implementations load ebpf into the kernel to monitor and act on security hooks and Crowdstrike now uses that rather than requiring its own kernel module that would otherwise absolutely have allowed this to happen, so everyone please say thank you to him
Conversation
Notices
-
Embed this notice
Matthew Garrett (mjg59@nondeterministic.computer)'s status on Saturday, 20-Jul-2024 09:55:14 JST Matthew Garrett - Haelwenn /элвэн/ :triskell: likes this.
-
Embed this notice
翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Sunday, 21-Jul-2024 03:27:05 JST 翠星石 @mjg59 Not loading arbitrary proprietary malware onto your computers that loads more of it and poorly formatted config files via a remote backdoor would have prevented it.
What license was the crowdstrike Linux module under?