Im sure you all saw that video of the microsoft dev telling us why the bug happened. If you havent, Crowdstrike is a virus/malware security company that packaged their program as a "driver", so they have access to the kernel. On top of that its a bootable driver, so it loads as soon as you turn on the computer. I cant speak for all drivers, but at least in the case of NVDA driver updates to graphics cards, they have to go through Microsoft testing, which is done by Microsoft to determine it is functional and doesnt cause any issues before providing a certificate to let that driver be published.

    As for Crowdstrike, being the incredibly fast and up to the minute protection, they dont have time to do a certificate test to get an approval from microsoft, so they change 1 text file, and push it to all of the machines using their driver. Well on friday, we all saw that driver failed to boot due to an error in the text file. I believe it was a file full of 0's?

    Blame the EU for allowing Kernel access in the first place, as they didnt want MSFT to have a monopoly on a virus protector.

    What could very well happen in the long term is Crowdstrike will get their kernel access removed, or be required to update their certificate every time they have an update. Getting their kernel access removed, would make the an average run of the mill virus scanner, and if they are required to update their certificate every time, they would then be behind the ball in terms of protection as a threat would potentially have days/weeks to infiltrate before Crowdstrike gets to update.

    In the short term, I also believe customers will break their contracts and move to competitors. Lawsuits will also happen for all the loss of business, as negligence isnt covered under insurance.

    PUTS!!! If youre buying calls, or stock, youre nutty.

    TL;DR Crowdstrike is fked. Buy puts. Fuck your calls.

    CRWD is going to die.
    byu/Da_Millionaire inwallstreetbets



    Posted by Da_Millionaire

    45 Comments

    1. As a software engineer, this is the most regarded DD I have ever read. Godspeed!

    2. billy_goat_13848 on

      Is going to die chocking on my balls, with my bull cum all over it!!!
      Gonna cum so fucking hard your calls are going to explode

    3. ITguyissnuts on

      Crowdstrike is not going to lose kernel access. Average Joe thinks this whole thing was an azure problem.  They are going to come out and explain how they have improved testing and  QA on windows machines an it’ll be back to normal, sans the possibility of lawsuits which I have to assume they were not stupid enough to include a critical error like this in the ToS

    4. (I am already betting with different instruments on crowdstrike dying before the end of the year)

      Crowdstrike is only propped up by the thesis of it being a growth company with exceptional margins. However, its barely profitable. They have only have 3.7bill in Cash.

      Once that revenue cut hits in Q2 and Guidance gets fucked (they probably wont give guidance for the rest of fiscal 25) its already gonna crater. Then the Suits hit. EULA and TS won’t protect them against Gross negligence suits. They will have to prove that wasn’t gross negligence and Cali does not cap damages on gross negligence. In no fucking way will they have enough cash to cover 1/10 of claims.

      Chapter 11 is absolutely likely before Q3. The only bull case basically is that Amazon, Google, Microsoft wush in and buy their stuff and all my lovely options and warrants get fucked once the underlying stops trading.

      (The pre market rebound is just a dead cat bounce regards, this shit will die)

    5. Striking_Courage_728 on

      This doesn’t only affect their vm position but it effects the xdr and full soc offering, as they use the same agent. But bigger question is how does it effect their competitors. I already have people asking me about solutions that don’t have kernel access

      Their has been too many zero days that lock you down at reboot.

    6. Wild claims, getting the above mentioned done is quite difficult & involves a very tedious task as per the policies.

    7. unknownnoname2424 on

      dead cat bounce today… probably will test $150 and less in the next few months as lawsuits pile in…

    8. CRWD is not the only one like this. Almost all virus scanners work like this using a driver.

      EDIT – malware protection i should say, not so much the virus scanner itself.

    9. The issue is with deployment processes not with the product, keep that in mind please.

      Kind regards.

    10. It isn’t that difficult to get a driver signed. They’re more concerned with intentionally malicious drivers, not a driver that once had an accidental bug.

    11. zitterbewegung on

      I think it will die but it’s not going to be very immediate and more like a slow bleed. Assuming that they will die their large customers will have to switch to another vendor and that would be very involved. OTOH Elon Musk said he was able to instruct IT to delete CroudStrike Falcon from all servers / clients but we have no idea how large the deployment was.

    12. meshreplacer on

      I bought 51 bucks in CRWD
      Puts last Friday and closed out for 273 bucks on Monday.
      So lots of Wendy’s on Crowdstrike.

    13. Vegetable-Balance-53 on

      Offer Microsoft a lot of money to help setup an independent test center for them? Good for both companies..

    14. Rich-Candidate-3648 on

      the crowdstrike CEO was the CTO at Mcafee when they destroyed the internet. The ended up so dead MSFT bought them. This is a repeat.

    15. Tell me you know nothing about CRWD without saying you know nothing about CRWD

    16. fancyhumanxd on

      This is a classic overreaction. Great buying opportunity. Reminds me of the time everyone said Meta was over.

    Leave A Reply
    Share via