The recent CrowdStrike outage, impacting an estimated 8.5 million* Windows computers, has sent shockwaves through the cybersecurity world. The irony is stark: a company renowned for its endpoint protection solutions caused a global disruption far exceeding the damage of many malware attacks. But how does it really compare?
What Happened During the Crowdstrike Outage?
On July 19, 2024, at 04:09 UTC, CrowdStrike released a Rapid Response Content update for the Falcon sensor targeting Windows hosts running sensor version 7.11 and above. This update aimed to enhance telemetry gathering on new threat techniques. However, it inadvertently triggered system crashes (Blue Screen of Death or BSOD) on affected Windows systems that were online between 04:09 and 05:27 UTC. Notably, Mac and Linux systems were not impacted, nor were Windows hosts that were offline or did not connect during this period.
CrowdStrike Report – https://www.crowdstrike.com/wp-content/uploads/2024/07/CrowdStrike-PIR-Executive-Summary.pdf
The Unprecedented Scale of the CrowdStrike Outage
The CrowdStrike incident wasn’t a malicious attack, but a faulty update that triggered widespread “blue screens of death.” Yet, its impact was massive:
- Global Reach: Systems across continents ground to a halt, disrupting businesses, government services, and individuals alike.
- Critical Infrastructure: Reports suggest hospitals, airports, and other essential services were affected, raising serious concerns about the fragility of modern technology.
- Financial Impact: The downtime and recovery costs are still being tallied, but the losses are likely to be significant.
Comparing the CrowdStrike Incident to Major Malware Attacks
To put the CrowdStrike outage in perspective, let’s look at some notorious malware events:
- WannaCry (2017): This ransomware infected over 200,000 computers in 150 countries, causing billions in damages.
- NotPetya (2017): Disguised as ransomware, this wiper malware crippled businesses worldwide, with estimated losses of over $10 billion.
- SolarWinds (2020): A sophisticated supply chain attack that compromised numerous government agencies and businesses, highlighting the risks of interconnected systems.
While these attacks were devastating, the CrowdStrike outage arguably had a broader, more immediate impact due to its sheer scale and disruption of critical systems.
Key Takeaways and Lessons Learned
The CrowdStrike incident serves as a stark reminder of several crucial points:
- Single Point of Failure: Relying heavily on one vendor, even for security, can create vulnerabilities. Diversifying solutions is essential.
- Patch Management: Even legitimate updates can wreak havoc if not thoroughly tested. Rigorous QA processes are non-negotiable.
- Incident Response: Having a well-defined, practiced incident response plan is crucial for minimising downtime and damage.
- Cybersecurity Awareness: The threat landscape is constantly evolving. Organisations and individuals must remain vigilant and informed.
- Malware Protection has full control: Malware protection has ultimate control to a system, more than an administrator.
Looking Ahead: What Next
CrowdStrike has taken responsibility for the outage and is working on remediation. However, this incident will undoubtedly have lasting repercussions, particularly regarding trust in the company’s products plus it raises many questions….
Should organisations consider moving to malware protection that doesn’t have the same risks as Crowdstrike?
Does this mean CrowdStrike will lose it’s customers?
Must companies using CrowdStrike look for alternatives?
Should organisations using CrowdStrike manage the risk of CrowdStrike and look at diversifying and using a different brand malware protection for sections of their organisation?
Reach out to Vertex if you want some Expert Cyber Security Advice on the best approach and solution for your organisation’s Malware protection or to avoid being impacted by these type of outages.
* Estimate by Microsoft – https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/