Cloudflare outage caused by botched blocking of phishing URL (www.bleepingcomputer.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 10 Feb 12:29
https://sh.itjust.works/post/32553865

#cybersecurity

threaded - newest

thesystemisdown@lemmy.world on 10 Feb 13:16 collapse

The outage occurred yesterday when an employee responded to an abuse report about a phishing URL in Cloudflare’s R2 platform. However, instead of blocking the specific endpoint, the employee mistakenly turned off the entire R2 Gateway service.

Oopsies

IndieSpren@lemmy.blahaj.zone on 10 Feb 14:36 collapse

Why tf did this employee have the permissions to turn off the entire service? If their job is responding to abuse reports, they do not need that level of privilege.

Thassodar@lemm.ee on 10 Feb 15:50 next collapse

Possibly paid by an outside actor to cause a service disruption? Rival company, the government, etc.

kn33@lemmy.world on 10 Feb 17:19 collapse

First - Hanlon’s Razor

Second - that doesn’t explain how they had the permission to do that single handedly

Pika@sh.itjust.works on 10 Feb 16:21 collapse

It’s entirely possible the employee had more than one hat and was dabbling in customer service that day. it’s not unheard of in the IT field for the buckets to mix when demand states it. Being said the better question is how you could mistake a shutdown/deactivate button as an apply button

apperently cloudflare thought the same as they removed the button from the panel the employee used lmao

scytale@lemm.ee on 10 Feb 20:09 collapse

And even then, there should be an approval workflow to at least have one more set of eyes review the change before it’s implemented.