Cybersecurity or Internet security Blog

All businesses and individuals use a network system that contains personal or business data. This data must be protected from unauthorized use and damage. After all, data = information, and let's not forget that information is an essential asset.

In this context, cybersecurity solutions are the implementation of techniques and technologies for the maintenance and protection of network infrastructure and data.

At ED&TD®, we offer comprehensive solutions to protect your organization's information. From vulnerability assessments to security best practices training, we are passionate about providing peace of mind to our clients.

This blog is an example of the comprehensive solutions that we offer our customers, guests, and more, where we post the latest information about on security assessments in this specific field.

By David ben Shlomoh Lopez
Design and Development Engineer and Cyber security expert


Latest news... from the technological border

BSOD error in latest crowdstrike update
Falcon Sensor

Late Thursday into Friday, reports began to emerge of IT problems wherein Windows computers were getting stuck with the infamous “Blue Screen of Death (BSOD)” — a bright blue error screen with a message that displays when Windows encounters a critical failure, crashes or cannot load.

"CrowdStrike is actively working with customers impacted by a defect found in a single content update for Windows hosts. Mac and Linux hosts are not impacted. This was not a cyberattack." CrowdStrike posted on its website.

Who is affected by this IT crash?

  1. Below is a detailed table listing the affected countries and services as of July 19, 2024.
    Country Category Details
    Australia Media ABC, SBS, Seven Network, Nine Network
    Airlines Qantas, Virgin Australia, Jetstar
    Airports Sydney, Melbourne
    Supermarkets Woolworths, Coles
    Banks NAB, ANZ, Commonwealth Bank, Bendigo Bank, Suncorp
    Retailers and Fast Food KFC, self-checkout systems
    Canada Banks TD Canada Trust mobile app outage
    Belgium Train Services Train ticket purchases, digital announcements
    Media JOE, QMusic
    Banks and Post Services
    Airports Brussels, Charleroi
    France TV Channels TF1, TFX, LCI, Canal+
    Systems Systems for the 2024 Paris Olympics
    Croatia Health and Air Traffic Central Health Information System, Air Traffic Control
    Germany Airports and Airlines Berlin Airport, Lufthansa
    Hospitals Hospitals in Lübeck and Kiel
    Hong Kong SAR Airports Hong Kong International Airport
    Airlines Cathay Pacific, Hong Kong Express, Hong Kong Airlines
    India Airlines Air India, Indigo, Akasa Air, SpiceJet, Vistara
    IT Firms Oracle, Nokia
    Israel Emergency and Health Magen David Adom, Hospitals: Sheba, Laniado, Rambam
    Services Israel Post, banks, pharmaceutical companies
    Malaysia Railway Services Railway operator KTMB’s ticketing system
    Netherlands Airports and Airlines Schiphol airport, Transavia Airlines
    Banks KNAB bank
    Government Government services, hospitals
    New Zealand Banks ANZ, ASB, Kiwibank, Westpac
    Supermarkets Woolworths, Foodstuffs
    Transport and Airports Auckland Transport, Christchurch Airport
    Philippines Various Services Banks, telecommunications, broadcasts, supermarkets
    Airlines Cebu Pacific flights
    South Korea Airlines Jeju Air
    Singapore Airports Changi Airport
    Spain Air Navigation Services ENAIRE’s Aena
    Switzerland Airports Zurich Airport
    United Kingdom Media Sky News, CBBC
    Airports Edinburgh, Gatwick
    Rail Companies
    Health Services NHS services
    Financial Services London Stock Exchange
    Retailers Ladbrokes Coral
    United States Airlines Ground stops for United, Delta, American Airlines
    Emergency Services 911 service outages in Alaska, Arizona, New Hampshire
  2. The US Aviation Authority has mandated that all flights must land due to a technical computer glitch.
  3. Blue Screens at the Delhi Airport.
  4. Several federal agencies are affected by the incident, including the Department of Education, and Social Security Administration, which said Friday that it closed its offices as a result of the outage.

What is the IT problem?

CrowdStrike is a U.S.-based cybersecurity company with significant global technology market share. Its flagship product is Falcon, a software platform that organizations install on their computers to protect them from cyber-attacks and malware.

Falcon is essentially privileged software known as Endpoint Detection and Response (EDR). Its job is to monitor what is happening on the computers on which it is installed, looking for signs of nefarious activity (such as malware). If it detects something suspicious, it helps lock down the threat. To detect signs of an attack, Falcon must monitor computers in great detail, so it has access to many internal systems. This includes what communications computers are sending over the Internet, what programs are running, what files are being opened, and more.

Why did Falcon cause this IT problem?

When you install new software or apply any updates, the new product makes many changes to the Windows Registry. So, if the new software solutions have privileged access to a critical registry such as the kernel, device drivers, services, Security Accounts Manager, and user interfaces such as Falcon you have the perfect scenario for an IT geostorm called a Blue Screen of Death (BSOD).

CrowdStrike's latest update crashes Windows hosts associated with the Falcon sensor. And today's outage is a worst-case scenario.

How do I fix it?

Workaround Steps for individual hosts:
  • Reboot the host to give it an opportunity to download the reverted channel file. If the host crashes again, then:
    Boot Windows into Safe Mode or the Windows Recovery Environment
    NOTE: Putting the host on a wired network (as opposed to WiFi) and using Safe Mode with Networking can help remediation.
  • Navigate to the %WINDIR%\System32\drivers\CrowdStrike directory
  • Locate the file matching "C-00000291*.sys“, and delete it.
  • Boot the host normally.
    Note: Bitlocker-encrypted hosts may require a recovery key.
Workaround Steps for public cloud or similar environment including virtual:
    Option 1:
  • Detach the operating system disk volume from the impacted virtual server
  • Create a snapshot or backup of the disk volume before proceeding further as a precaution against unintended changes
  • Attach/mount the volume to to a new virtual server
  • Navigate to the %WINDIR%\System32\drivers\CrowdStrike directory
  • Locate the file matching "C-00000291*.sys“, and delete it.
  • Detach the volume from the new virtual server
  • Reattach the fixed volume to the impacted virtual server
    Option 2:
  • Roll back to a snapshot before 0409 UTC.

Why is this IT problem is a Cyber Threat?

This IT problem is not an attack BUT it's a cyber threat if your not fix the issue.

  • CISA says it has observed threat actors exploiting this incident for phishing and other malicious activities.
  • CISA urges organizations and individuals to remain vigilant and only follow instructions from legitimate sources.
  • CISA recommends that organizations remind their employees not to click on phishing emails or suspicious links.

If you need assistance or would like to discuss your vulnerability status, please contact us.

Latest news...


Backdoor in D-Link routers allows root access!
D-Link

If you are a network administrator using the following models of D-Link routers: E15, E30, G403, G415, G416, M15, M18, M30, M32, M60, R03, R04, R12, R15, R18, R32. You must apply the latest firmware to your router.

It is a critical vulnerability namely CVE-2024-6045 with 8.8 CVSS score, this vulnerability allows a backdoor on the models avobe, according to the investigators when the attacker is inside the LAN, he can enable session of Telnet on any device, now, if the attacker have the admin credentials he has the total control over device it.

D-Link launched since June 18th, 2024 the way to patch the vulnerability.

  1. Models G403, G415, G416, M18, R03, R04, R12, R18: Must be to upgraded to firmware version 1.10.01 or later.
  2. Models E30, M30, M32, M60, R32: Must be to upgraded to firmware version 1.10.02 or later.
  3. Models E15, R15 models: Must be to upgraded to firmware version 1.20.01 or later.

If you need assistance or would like to discuss your vulnerability status, please contact us.

Latest news...