Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    AT&T is raising home internet prices for the second year in a row

    October 17, 2025

    MacBook Pro rumor points to OLED, touchscreen upgrades next year

    October 16, 2025

    Amazon shares a ‘first look’ at new nuclear facility

    October 16, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Computer Crash Reports Are an Untapped Hacker Gold Mine
    Security

    Computer Crash Reports Are an Untapped Hacker Gold Mine

    News RoomBy News RoomAugust 9, 20244 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    When a bad software update from the security firm CrowdStrike inadvertently caused digital chaos around the world last month, the first signs were Windows computers showing the Blue Screen of Death. As websites and services went down and people scrambled to understand what was happening, conflicting and inaccurate information was everywhere. Rushing to understand the crisis, longtime Mac security researcher Patrick Wardle knew that there was one place he could look to get the facts: crash reports from computers impacted by the bug.

    “Even though I am not a Windows researcher, I was intrigued by what was going on, and there was this dearth of information,” Wardle tells WIRED. “People were saying that it was a Microsoft problem, because Windows systems were blue-screening, and there were a lot of wild theories. But actually it had nothing to do with Microsoft. So I went to the crash reports, which to me hold the ultimate truth. And if you were looking there you were able to pinpoint the underlying cause long before CrowdStrike came out and said it.”

    At the Black Hat security conference in Las Vegas on Thursday, Wardle made the case that crash reports are an underutilized tool. Such system snapshots give software developers and maintainers insight into possible problems with their code. And Wardle emphasizes that they can particularly be a fount of information about potentially exploitable vulnerabilities in software—for both defenders and attackers.

    In his talk, Wardle presented multiple examples of vulnerabilities he has found in software when an app crashed and he combed through the report looking for the possible cause. Users can readily view their own crash reports on Windows, macOS, and Linux, and they’re also available on Android and iOS, though they can be more challenging to access on mobile operating systems, particularly iOS. Wardle notes that to glean insights from crash reports, you need a basic understanding of instructions written in the low-level machine code known as Assembly, but he emphasizes that the payoff is worth it.

    To provide some concrete examples, Wardle, who is the founder of the Objective See Foundation, presented multiple vulnerabilities he discovered simply by examining crash reports on his own devices—including bugs in the analysis tool YARA and in the current version of Apple’s macOS operating system. In fact, when Wardle discovered in 2018 that an iOS bug caused apps to crash anytime they displayed the Taiwanese flag emoji, he got to the bottom of what was happening using, you guessed it, crash reports.

    “We revealed conclusively that Apple had acquiesced to demands from China to censor the Taiwanese flag, but their censorship code had a bug in it—ridiculous,” he says. “My friend who originally observed this was like, ‘My phone is being hacked by the Chinese. Whenever you text me it crashes. Or are you hacking me?’ And I said, ‘Rude, I wouldn’t hack you. And also, rude, if I did hack you, I wouldn’t crash your phone.’ So I pulled the crash reports to see what was going on.”

    Wardle emphasizes that if he can find so many vulnerabilities just by looking at crash reports from his own devices and those of his friends, software developers need to be looking there, too. Sophisticated criminal actors and well-funded state-backed hackers alike are probably already getting ideas from their own crash reports. Over the years, news reports have indicated that intelligence agencies like the US National Security Agency do mine crash logs. Wardle points out that crash reports are also a valuable source of information for detecting malware, since they can reveal anomalous and potentially suspicious activity. The notorious spyware broker NSO Group, for example, would often build mechanisms into into their malware specifically to delete crash reports immediately upon infecting a device. And the fact that malware is often buggy makes crashes more likely and crash reports valuable to attackers as well for understanding what went wrong with their code.

    “With crash reports, the truth is out there,” Wardle says. “Or, I guess, in there.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleYou can get the first six Final Fantasy games for around $10 a piece on this weekend deal
    Next Article Netflix’s Arcane, Terminator Zero, and other anime series leak

    Related Posts

    A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

    October 16, 2025

    North Korean Scammers Are Doing Architectural Design Now

    October 16, 2025

    ICE Wants to Build Out a 24/7 Social Media Surveillance Team

    October 14, 2025

    Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    October 14, 2025

    ‘Happy Gilmore’ Producer Buys Spyware Maker NSO Group

    October 14, 2025

    Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

    October 14, 2025
    Our Picks

    MacBook Pro rumor points to OLED, touchscreen upgrades next year

    October 16, 2025

    Amazon shares a ‘first look’ at new nuclear facility

    October 16, 2025

    A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

    October 16, 2025

    Apple TV and Peacock announce a discounted $15 monthly subscription bundle

    October 16, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    Pinterest’s ‘tuner’ lets you dial down the amount of AI content — but not entirely

    By News RoomOctober 16, 2025

    Pinterest is rolling out a tool that allows users to “dial down the AI” in…

    Ugreen’s 8-port Thunderbolt 4 hub is $80 off

    October 16, 2025

    OnePlus’ OxygenOS 16 brings Gemini into your Mind Space

    October 16, 2025

    A Plan to Rebuild Gaza Lists Nearly 30 Companies. Many Say They’re Not Involved

    October 16, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.