CrowdStrike update chaos explained: What you need to know | Computer Weekly (2024)

On Friday 19 July 2024, the UK awoke to news of a fast-spreading IT outage, seemingly global in its nature, affecting hundreds – if not thousands – of organisations.

The disruption began in the early hours of Friday morning in Australia, before spreading quickly across Asia, Europe and the Americas, with the travel industry among the most widely affected.

The outage was quickly tracked to cyber security firm CrowdStrike, which is already engaged in incident response amid the chaos. Keep on top of this developing incident over the coming days and weeks with our Essential Guide.

What does CrowdStrike do?

CrowdStrike is one of the world’s most prominent cyber security companies, with thousands of customers all over the world. Based in Texas, it employs more than 8,000 people and books about $3bn in revenues per annum. It has been around since 2011.

The organisation bills itself thus: “CrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. CrowdStrike secures the most critical areas of risk – endpoints and cloud workloads, identity, and data – to keep customers ahead of today’s adversaries and stop breaches.”

CrowdStrike will be unfamiliar to most people not steeped in the technology industry, although Formula 1 fans will be aware of it thanks to its headline sponsorship of the Mercedes AMG Petronas team – its branding appears on the halo safety device and is clearly seen on onboard footage from Lewis Hamilton’s car.

Security practitioners will know CrowdStrike from its frequent contributions to major incident investigations, including the Sony Pictures hack, the WannaCry crisis, and the 2016 hack of the Democratic National Committee by Russia.

What happened during the CrowdStrike outage?

The disruption at first manifested in the form of the infamous blue screen of death – which signals a fatal system error – on Windows PCs.

Given the disruption appeared to be a Microsoft problem to begin with, it was Redmond that first responded, confirming just before 8am BST that it was investigating problems affecting cloud services in the US.

It quickly became apparent that the issue was not down to Microsoft itself, but rather a faulty channel file rolled out to CrowdStrike’s Falcon sensor product.

Falcon is a solution designed to prevent cyber attacks by unifying next-gen antivirus, endpoint detection and response (EDR), threat intelligence and threat hunting, and security hygiene. This is all managed and delivered through a lightweight, cloud-delivered and -managed sensor, which seems to be whence the issue arose.

The botched roll-out effectively caused what is known as a boot loop. This is a situation that occurs when a Windows device restarts without warning during its startup process – meaning the machine cannot finish a complete and stable boot cycle and, therefore, won’t turn on.

At the time of writing, the full facts of the incident have not been fully established, and an investigation will likely take some time.

However, such issues will in general occur either due to inadequate testing across various desktop and server environments, or due to a lack of proper sandboxing and rollback mechanisms for updates that involve a kernel-level interaction.

Is there a cyber security threat from the CrowdStrike outage?

Though similar in its effect and origins to a supply chain attack, it is important to note that the CrowdStrike outage is not a cyber security incident and nobody is known to be under attack as a result of it.

However, as it affects a cyber security product threat actors will take advantage of the downtime caused and any gaps in coverage arising. This has already started to happen, within hours of the incident unfolding CrowdStrike itself said it identified a malicious ZIP archive circulating which purported to contain a utility to help automate recovery, but was in fact a so-called remote access Trojan (RAT).

Multiple national cyber security agencies, including the UK's National Cyber Security Centre (NCSC) and partners in Australia, Singapore and the US, have also issued cyber alerts and advisories in the wake of the outage.

The coming days and weeks will see threat actors exploiting the incident in phishing and social engineering attacks as they attempt to lure new victims. Potential lures could include offers of technical support or bogus CrowdStrike updates, and the consequences could include data exfiltration, ransomware deployment and extortion.

Security and IT leaders and admins would be well-advised to communicate the potential follow-on dangers to their users.

Who was affected by the CrowdStrike outage?

According to Microsoft, the incident affected approximately 8.5 million Windows devices worldwide, making up less than 1% of the entire estate. Redmond said that while this was a tiny number, all things considered, the widespread economic and societal impacts of the incident reflected the use of CrowdStrike by many organisations that run critical public-facing services.

The full number of organisations affected by the outage is not known for now. However, those that are known to have, or have confirmed they have, experienced some impact include:

  • Airlines including American Airlines, Delta, KLM, Lufthansa, Ryanair, SAS and United;
  • Airports including Gatwick, Luton, Stansted and Schiphol;
  • Financial organisations including the London Stock Exchange, Lloyds Bank and Visa;
  • Healthcare including most GP surgeries and many independent pharmacies;
  • Media organisations including MTV, VH1, Sky and some BBC channels;
  • Retailers, leisure and hospitality organisations including Gail’s Bakery, Ladbrokes, Morrisons, Tesco and Sainsbury’s;
  • Sporting bodies including F1 teams Aston Martin Aramco, Mercedes AMG Petronas and Williams Racing, which were preparing to compete at the Hungarian Grand Prix at the time, and the Paris 2024 Organising Committee for the Olympic and Paralympic Games, which begin in a few days;
  • Train operating companies (TOCs) such as Avanti West Coast, Merseyrail, Southern and Transport for Wales.

What is CrowdStrike saying about the outage?

In an initial statement, CrowdStrike CEO George Kurtz said: “CrowdStrike is actively working with customers impacted by a defect found in a single content update for Windows hosts. Mac and Linux hosts are not impacted. This is not a security incident or cyber attack.

“The issue has been identified, isolated and a fix has been deployed. We refer customers to the support portal for the latest updates and will continue to provide complete and continuous updates on our website.

“We further recommend organisations ensure they’re communicating with CrowdStrike representatives through official channels.Our team is fully mobilised to ensure the security and stability of CrowdStrike customers.”

In a breakfast TV interview with NBC in the US on 19 July, Kurtz added: “We’re deeply sorry for the impact that we’ve caused to customers, to travellers, to anyone affected by this, including our companies.”

What has been Microsoft's response

Microsoft has been working extensively alongside CrowdStrike to automate work on developing and pushing a fix, and in the wake of the outages hundreds of its engineers and software experts were deployed to work directly with customers on service restoration.

Microsoft has also been collaborating with cloud providers such as Google Cloud and Amazon Web Services (AWS) to share awareness on the impacts seen, and better inform ongoing dialogue with customers and CrowdStrike itself.

Can I fix the CrowdStrike problem myself?

CrowdStrike has rolled back the changes to the affected product automatically, but hosts may continue to crash or be unable to stay online to receive the remedial update.

The short answer to the question is yes, but unfortunately, such issues can be daunting to fix, requiring IT teams to put in a lot of work. It may be days, or even longer, before all the affected devices can be reached.

System administrators are advised to take the following steps:

  1. Boot Windows into safe mode, or the Windows Recovery Environment;
  2. Navigate to C:\Windows\System32\drivers\CrowdStrike directory;
  3. Locate the file matching “C-00000291*.sys”. Delete this file;
  4. Boot normally.

CrowdStrike customers can access more information by logging into its support portal.

How can I avoid similar problems in the future?

Security firms such as CrowdStrike are under a great deal of pressure when it comes to product development and updates, which must be done frequently as they strive to keep their customers protected from new zero-days, ransomware and the like.

This pressure also trickles down to customers themselves, who will understandably often want to take advantage of settings to allow their security tools to update automatically.

To avoid falling victim to this kind of problem going forward, IT teams should consider taking a phased approach to software updates – particularly if they pertain to security solutions – and test them in a sandbox environment, or on a limited set of devices, prior to full deployment.

It is also wise to have some level of system redundancy built in to properly isolate and manage fault domains, particularly when running critical infrastructure.

Computer Weekly and TechTarget coverage of the CrowdStrike incident

CrowdStrike update chaos explained: What you need to know | Computer Weekly (2024)

FAQs

What is the CrowdStrike issue explained? ›

Cybersecurity firm CrowdStrike pushed out a routine software update that inadvertently crashed customers' Windows systems. The very purpose of the update involved a core cybersecurity mission of detecting emerging threats and, specifically, gathering data “on possible novel threat techniques.”

How is CrowdStrike updated? ›

CrowdStrike delivers security content configuration updates to our sensors in two ways: Sensor Content that is shipped with our sensor directly, and Rapid Response Content that is designed to respond to the changing threat landscape at operational speed.

What computers were affected by CrowdStrike? ›

The CrowdStrike issue hit 8.5 million computers running Windows on Friday, July 19, and repercussions are still being felt. But if the person at the next desk was using a Mac, they were blithely unaffected. Here's why that is, and what Microsoft said contributed to the issue in the first place.

Why did CrowdStrike fail? ›

There was a logic flaw in Falcon sensor version 7.11 and above, causing it to crash. Due to CrowdStrike Falcon's tight integration into the Microsoft Windows kernel, it resulted in a Windows system crash and BSOD. The flaw in CrowdStrike Falcon was inside of a sensor configuration update.

Why is CrowdStrike falling? ›

Shares of CrowdStrike (CRWD) are still falling after a faulty update caused a global outage on Friday, sending the cybersecurity firm's shares plummeting, but some investors—including Cathie Wood's ARK Invest—are trying to buy the dip.

How do I get rid of CrowdStrike? ›

Uninstall from Control Panel
  1. Open the Windows Control Panel.
  2. Click Uninstall a Program.
  3. Choose CrowdStrike Windows Sensor and uninstall it.

How do I know if CrowdStrike is updated? ›

Once CrowdStrike is installed, it actively scans for threats on your machine without having to manually run virus scans. Updates for CrowdStrike should also come through automatically, so there is no need to update manually.

Does CrowdStrike monitor activity? ›

CrowdStrike is engineered to thwart attempts at compromising computer systems by monitoring and analyzing activities. It diligently records program executions, file interactions, and network behaviors, all while ensuring the user's data remains confidential.

What is the prediction for CrowdStrike? ›

Average Price Target

Based on 36 Wall Street analysts offering 12 month price targets for CrowdStrike Holdings in the last 3 months. The average price target is $368.26 with a high forecast of $450.00 and a low forecast of $275.00. The average price target represents a 44.59% change from the last price of $254.69.

Does CrowdStrike monitor browsing history? ›

CrowdStrike Falcon analyzes connections to and from the internet to determine if there is malicious behavior. It may record the addresses of websites visited but will not log the contents of the pages transmitted. This data is used to help detect and prevent malicious actions involving websites.

Does the US government use CrowdStrike? ›

The extent of the impact on federal government operations is still not known. Crowdstrike is in wide use across federal agencies and it is a key vendor on the governmentwide Continuous Diagnostics and Mitigation cybersecurity support services contract.

What big companies use CrowdStrike? ›

Customers of Crowdstrike
CustomersEmployee RangeCountry
Amazon Web Services10,000+United States
Home Depot, Inc.10,000+United States
OSI Group LLC10,000+United States
iQor10,000+United States
6 more rows

Who is CrowdStrike biggest competitor? ›

Compare the top alternatives to CrowdStrike endpoint security and anti-virus.
  • Huntress Managed Security Platform.
  • Bitdefender GravityZone.
  • Broadcom Symantec Endpoint Security.
  • ESET Endpoint Security.
  • Microsoft Defender for Endpoint.
  • Sophos Intercept X.
  • SentinelOne Singularity Platform.
  • Trellix Endpoint Security.

Who owns CrowdStrike? ›

The ownership structure of CrowdStrike Holdings (CRWD) stock is a mix of institutional, retail and individual investors. Approximately 44.31% of the company's stock is owned by Institutional Investors, 2.19% is owned by Insiders and 53.50% is owned by Public Companies and Individual Investors.

What caused the CrowdStrike crash? ›

The cybersecurity company blamed a bug in a program that's meant to catch issues before software updates are uploaded to customers. That glitch blocked "problematic content data" from being flagged before it was sent to clients, CrowdStrike said in an update on its website.

What is CrowdStrike incident response? ›

CrowdStrike delivers incident response and forensic analysis services that are designed to help your organization understand whether or not a breach has occurred, and to respond and recover from a breach with speed and precision to remediate the threat.

What is CrowdStrike blocking? ›

CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike's core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks — both malware and malware-free.

What does CrowdStrike detect? ›

CrowdStrike tracks over 200 malicious actors around the world and is able to attribute detections to an actor based on their attack profile. This adversary focused threat intelligence allows us to better identify attacks and allows you to preemptively deploy countermeasures to stop breaches of your network.

References

Top Articles
Latest Posts
Article information

Author: Velia Krajcik

Last Updated:

Views: 6401

Rating: 4.3 / 5 (74 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Velia Krajcik

Birthday: 1996-07-27

Address: 520 Balistreri Mount, South Armand, OR 60528

Phone: +466880739437

Job: Future Retail Associate

Hobby: Polo, Scouting, Worldbuilding, Cosplaying, Photography, Rowing, Nordic skating

Introduction: My name is Velia Krajcik, I am a handsome, clean, lucky, gleaming, magnificent, proud, glorious person who loves writing and wants to share my knowledge and understanding with you.