CrowdStrike outage explained: What caused it and what’s next (2024)

What might be considered the largest IT outage in history was triggered by a botched software update from security vendor CrowdStrike, affecting millions of Windows systems around the world. Insurers estimate the outage will cost U.S. Fortune 500 companies $5.4 billion.

The outage occurred July 19, 2024, with millions of Windows systems failing and showing the infamous blue screen of death (BSOD).

CrowdStrike -- the company at the core of the outage -- is an endpoint security vendor whose primary technology is the Falcon platform, which helps protect systems against potential threats in a bid to minimize cybersecurity risks.

In many respects, the outage was a real manifestation of fears that computing users had at the end of the last century with the Y2K bug. With Y2K, the fear was that a bug in software systems would trigger widespread technology failures. While the CrowdStrike failure was not Y2K, it was a software issue that did, in fact, trigger massive disruption on a scale that has not been seen before.

What caused the outage?

The CrowdStrike Falcon platform is widely used by organizations of all sizes across many industries. It is the pervasiveness of CrowdStrike's technology and its integration into so many mission-critical operations and industries that amplified the effect.

The outage was not a Microsoft Windows flaw directly, but rather a flaw in CrowdStrike Falcon that triggered the issue.

Falcon hooks into the Microsoft Windows OS as a Windows kernel process. The process has high privileges, giving Falcon the ability to monitor operations in real time across the OS. There was a logic flaw in Falcon sensor version 7.11 and above, causing it to crash. Due to CrowdStrike Falcon's tight integration into the Microsoft Windows kernel, it resulted in a Windows system crash and BSOD.

The flaw in CrowdStrike Falcon was inside of a sensor configuration update. The sensor is regularly updated -- sometimes multiple times daily -- to provide users with mitigation and threat protection.

The flawed update was contained in a file that CrowdStrike refers to as "channel files," which specifically provide configuration updates for behavioral protections. Channel file 291 is an update that was supposed to help improve how Falcon evaluates named pipe execution on Microsoft Windows. Named pipes are a common type of communication mechanism for interprocess communications on Microsoft Windows.

With channel file 291, CrowdStrike inadvertently introduced a logic error, causing the Falcon sensor to crash and, subsequently, Windows systems in which it was integrated.

The flaw isn't in all versions of channel file 291. The problematic version is channel file 291 (C-00000291*.sys) with timestamp 2024-07-19 0409 UTC. Channel file 291 timestamped 2024-07-19 0527 UTC or later does not have the logic flaw. By that time, CrowdStrike had noticed its error and reverted the change. But, for many of its users, that reversion came too late as they had already updated, leading to BSOD and inoperable systems.

CrowdStrike outage explained: What caused it and what’s next (1)

What services were affected?

Microsoft estimated that approximately 8.5 million Windows devices were directly affected by the CrowdStrike logic error flaw. That's less than 1% of Microsoft's global Windows install base.

But, despite the small percentage of the overall Windows install base, the systems affected were those running critical operations. Services affected include the following.

Airlines and airports

The outage grounded thousands of flights worldwide, leading to significant delays and cancellations of more than 10,000 flights around the world. In the United States, affected airlines included Delta, United and American Airlines. These airlines were forced to cancel hundreds of flights until systems were restored. Globally, multiple airlines and airports were affected, including KLM, Porter Airlines, Toronto Pearson International Airport, Zurich Airport and Amsterdam Schiphol Airport.

Public transit

Public transit in multiple cities was affected, including Chicago, Cincinnati, Minneapolis, New York City and Washington, D.C.

Healthcare

Hospitals and healthcare clinics around the world faced significant disruptions in appointment systems, leading to delays and cancellations. Some states also reported 911 emergency services being affected, including Alaska, Indiana and New Hampshire.

Financial services

Online banking systems and financial institutions around the world were affected by the outage. Multiple payment platforms were directly affected, and there were individuals who did not get their paychecks when expected.

Media and broadcasting

Multiple media and broadcast outlets around the world, including British broadcaster Sky News, were taken off the air by the outage.

Analysis of the CrowdStrike outage

In this podcast, TechTarget Security editors Rob Wright, Alex Culafi and Arielle Waldman assess last week's CrowdStrike outage and the organization's response.

Why Apple and Linux were not affected

CrowdStrike's software doesn't just run on Microsoft Windows; it also runs on Apple's macOS and the Linux OS.

But the July outage only affected Microsoft Windows. The root cause of the outage was a faulty sensor configuration update that specifically affected Windows systems. The channel file 291 update was never issued to macOS or Linux systems as the update deals with named pipe execution that only occurs on the Microsoft Windows OS.

The way that the Falcon sensor integrates as a Windows kernel process is also not the same in macOS or Linux. Those OSes have different integration points to limit potential risk.

However, there was a reported incident in June from Linux vendor Red Hat, where the Falcon sensor -- running as an eBPF program in Linux -- triggered a kernel panic. In Linux, a kernel panic is a type of crash, though typically not as dramatic as BSOD. That issue was resolved without Red Hat reporting any major incidents.

The dangers of putting all your eggs in one IT basket

Discover the possible consequences of relying on a concentrated and interconnected pool of vendors for all your infrastructure needs.

What happens when the IT infrastructure is too big to fail?

CrowdStrike chaos shows risks of concentrated big IT

CrowdStrike disaster exposes a hard truth about IT

How long will it take businesses to recover from this outage?

CrowdStrike itself was able to identify and deploy a fix for the issue in 79 minutes. While CrowdStrike quickly identified and deployed a fix for the issue, the recovery process for businesses is complex and time-consuming. Among the issues is that, once the problematic update was installed, the underlying Windows OS would trigger BSOD, rendering the system inoperative using the normal boot process.

IT administrators had to manually boot affected systems into Safe Mode or the Windows Recovery Environment to delete the problematic channel file 291 and restore normal operations. That process is labor-intensive, especially for organizations with many affected devices. In some cases, the process also required physical access to each machine, adding further time and effort to the process.

Some businesses were able to apply the fix within a few days. However, the process was not straightforward for all, particularly those with extensive IT infrastructure and encrypted drives. The use of the Microsoft Windows BitLocker encryption technology by some organizations made it significantly more time-consuming to recover as BitLocker recovery keys were required.

It is estimated that it could potentially take months for some organizations to entirely recover all affected systems from the outage.

The latest news on CrowdStrike's recovery efforts

BitLocker workaround may offer aid for CrowdStrike customers

CrowdStrike: 97% of Windows sensors back online after outage

CrowdStrike outage underscores software testing dilemmas

Hackers take advantage of outage

While the outage was not due to a cyberattack, threat actors have taken advantage of the incident.

According to a blog post from CrowdStrike, the security vendor has received reports of the following malicious activity:

  • Phishing emails sent to customers posing as CrowdStrike support.
  • Fake phone calls impersonating CrowdStrike staff.
  • Selling scripts claiming to automate recovery from the botched update.
  • Posing as independent researchers saying the outage was due to a cyberattack and offering remediation insights.

CISA urges individuals and organizations to only follow instructions from legitimate sources and avoid opening suspicious emails and links.

How can businesses be better prepared for tech outages?

The CrowdStrike Windows outage highlighted the vulnerabilities of modern society's heavy reliance on technology. While system backups and automated processes are essential, having manual procedures in place can significantly enhance business continuity during tech outages.

But there are a few things businesses can do to be better prepared for tech outages, including the following.

Test all updates before deploying to production

It has been a best practice for years to allow automated updates to ensure systems are always up to date. However, the CrowdStrike issue laid bare the underlying risk with that approach. For mission-critical systems, testing updates before deployment or having some form of staging environment before pushing updates to production might help to mitigate some risk.

Develop and document manual workarounds

Manual workarounds ensure critical business processes can continue even when technology fails. This approach was common before the digital age and, in the event of outage, can serve as a fallback. Documenting and practicing manual procedures can help mitigate the effect of outages, ensuring businesses can still operate and serve their customers, even during an outage.

Perform disaster recovery and business continuity planning

Outages happen for any number of different reasons. Having extensive disaster recovery and business continuity practices and plans in place is critical. Part of that effort should include the use of redundant systems and infrastructure to minimize downtime and ensure critical functions can switch to backup systems when needed.

Sean Michael Kerner is an IT consultant, technology enthusiast and tinkerer. He has pulled Token Ring, configured NetWare and been known to compile his own Linux kernel. He consults with industry and media organizations on technology issues.

For more information about the CrowdStrike outage, read the following articles:

Is today's CrowdStrike outage a sign of the new normal?

CrowdStrike chaos casts a long shadow on cybersecurity

CrowdStrike outage explained: What caused it and what’s next (2024)

FAQs

CrowdStrike outage explained: What caused it and what’s next? ›

CrowdStrike's software doesn't just run on Microsoft Windows; it also runs on Apple's macOS and the Linux OS. But the July outage only affected Microsoft Windows. The root cause of the outage was a faulty sensor configuration update that specifically affected Windows systems.

What is the root cause of the CrowdStrike outage? ›

The main issue was a mismatch between the input fields expected by CrowdStrike's Falcon driver and the ones supplied in a content update. CrowdStrike is now promising to better test updates and is using two independent third-party software security vendors to review its sensor code and release processes.

What was the cause of the CrowdStrike issue? ›

Microsoft confirms the analysis done by CrowdStrike last week. The crash was due to a read-out-of-bounds memory safety error in CrowdStrike's CSagent. sys driver.

Why did CrowdStrike go down? ›

This corporate crisis wasn't supposed to happen — not to this company, and certainly not to this extent. When CrowdStrike (CRWD) sent customers a faulty update to its cybersecurity software in mid-July, the routine event quickly snowballed into an information technology outage of historic proportions.

What caused Microsoft's outage? ›

What are the reasons for the global IT outage? CrowdStrike had pushed an update on Friday for Microsoft applications and devices but it turned out to be faulty in nature and caused a 'blue screen of death' to appear on user's screens, instead of the Windows OS booting up.

Is CrowdStrike liable for outages? ›

Despite CrowdStrike conceding responsibility for the outage, neither direct customers nor businesses disrupted by proximity—i.e., the customers of CrowdStrike customers—will find it easy to recover their losses.

How much did the CrowdStrike outage cost? ›

The days-long cyberincident — which grounded planes, shuttered businesses and stopped markets — cost Fortune 500 companies about $5.4 billion in damages, according to insurance company Parametrix.

Is the CrowdStrike outage fixed? ›

We quickly identified the issue and deployed a fix, allowing us to focus diligently on restoring customer systems as our highest priority. The outage was caused by a defect found in a Falcon content update for Windows hosts. Mac and Linux hosts are not impacted. This was not a cyberattack.

Can CrowdStrike survive? ›

CrowdStrike will likely survive and move forward, but, reputationally, it can't afford another incident like this, said William MacMillan, a former CISO at the CIA.

Does the US government use CrowdStrike? ›

Get the latest federal technology news delivered to your inbox. The extent of the impact on federal government operations is still not known. Crowdstrike is in wide use across federal agencies and it is a key vendor on the governmentwide Continuous Diagnostics and Mitigation cybersecurity support services contract.

Who is the biggest investor in CrowdStrike? ›

According to the latest TipRanks data, approximately 37.92% of CrowdStrike Holdings (CRWD) stock is held by retail investors. VANGUARD INDEX FUNDS owns the most shares of CrowdStrike Holdings (CRWD).

Who is CrowdStrike biggest competitor? ›

Top Competitors and Alternatives of Crowdstrike

The top three of Crowdstrike's competitors in the Endpoint Protection category are McAfee ePO with 21.21%, SentinelOne with 9.73%, Duo Security with 7.65% market share.

Is CrowdStrike going to recover? ›

JPMorgan's commentary emphasizes the expectation that CrowdStrike will return to its fundamental strength over the medium term. The firm's analysis suggests that CrowdStrike will not only recover from recent challenges but also sustain its position as a leading and superior security software platform.

Who was the employee who caused the CrowdStrike outage? ›

A person named Vincent Flibustier introduced himself as a CrowdStrike—the cybersecurity firm at the centre of the outage—employee on X (formerly known as Twitter) and claimed responsibility for the chaos. Hours later, in another post, Flibustier said he was fired following the outage.

What happened exactly in CrowdStrike? ›

The sensor expected 20 input fields, but the update provided 21 input fields. “In this instance, the mismatch resulted in an out-of-bounds memory read, causing a system crash,” CrowdStrike wrote.

What caused the CrowdStrike Microsoft outage? ›

As CrowdStrike immediately explained to customers and the world, the problem was not a cyberattack but an error in the software update. Because the bug was in CrowdStrike's Falcon platform update for Microsoft Windows, computers using other operating systems (e.g. Mac and Linux) were not impacted.

What is the prediction of CrowdStrike stock? ›

Average Price Target

Based on 40 Wall Street analysts offering 12 month price targets for CrowdStrike Holdings in the last 3 months. The average price target is $325.17 with a high forecast of $420.00 and a low forecast of $265.00. The average price target represents a 32.48% change from the last price of $245.44.

Was Amazon affected by CrowdStrike? ›

The disruption shows that even a global tech giant like Amazon, which runs the world's largest cloud computing service in AWS, was vulnerable to the faulty CrowdStrike software update.

How does CrowdStrike stop breaches? ›

CrowdStrike's core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks — both malware and malware-free.

What is the long term outlook for CrowdStrike? ›

With its 3-star rating, we believe CrowdStrike's stock is fairly valued compared with our long-term fair value estimate of $300 per share, which implies a fiscal 2025 enterprise value/sales multiple of 17 times. We forecast CrowdStrike's revenue to see a 29% compound annual growth rate over the next five years.

References

Top Articles
786-O Xenograft Model | Xenograft Services
Pobierz Yaba Sanshiro 2 na PC za pomocą MEmu
What Is Single Sign-on (SSO)? Meaning and How It Works? | Fortinet
Kem Minnick Playboy
Sprinter Tyrone's Unblocked Games
Unit 30 Quiz: Idioms And Pronunciation
Jackerman Mothers Warmth Part 3
Wisconsin Women's Volleyball Team Leaked Pictures
Rabbits Foot Osrs
La connexion à Mon Compte
Nwi Police Blotter
Wfin Local News
Craigslist - Pets for Sale or Adoption in Zeeland, MI
What is the surrender charge on life insurance?
California Department of Public Health
Burn Ban Map Oklahoma
Bahsid Mclean Uncensored Photo
How To Cut Eelgrass Grounded
Craftology East Peoria Il
Rachel Griffin Bikini
Fdny Business
Diamond Piers Menards
Exterior insulation details for a laminated timber gothic arch cabin - GreenBuildingAdvisor
VERHUURD: Barentszstraat 12 in 'S-Gravenhage 2518 XG: Woonhuis.
Kaitlyn Katsaros Forum
Puretalkusa.com/Amac
Governor Brown Signs Legislation Supporting California Legislative Women's Caucus Priorities
Japanese Mushrooms: 10 Popular Varieties and Simple Recipes - Japan Travel Guide MATCHA
Morse Road Bmv Hours
SN100C, An Australia Trademark of Nihon Superior Co., Ltd.. Application Number: 2480607 :: Trademark Elite Trademarks
Munis Self Service Brockton
Jordan Poyer Wiki
Yugen Manga Jinx Cap 19
Hesburgh Library Catalog
Ezstub Cross Country
134 Paige St. Owego Ny
AsROck Q1900B ITX und Ramverträglichkeit
Finland’s Satanic Warmaster’s Werwolf Discusses His Projects
Ise-Vm-K9 Eol
Final Jeopardy July 25 2023
Sabrina Scharf Net Worth
Infinite Campus Parent Portal Hall County
Mid America Irish Dance Voy
Infinite Campus Farmingdale
Gasoline Prices At Sam's Club
Mychart University Of Iowa Hospital
15 Best Places to Visit in the Northeast During Summer
Smoke From Street Outlaws Net Worth
Call2Recycle Sites At The Home Depot
2487872771
Estes4Me Payroll
Volstate Portal
Latest Posts
Article information

Author: Dr. Pierre Goyette

Last Updated:

Views: 5704

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Dr. Pierre Goyette

Birthday: 1998-01-29

Address: Apt. 611 3357 Yong Plain, West Audra, IL 70053

Phone: +5819954278378

Job: Construction Director

Hobby: Embroidery, Creative writing, Shopping, Driving, Stand-up comedy, Coffee roasting, Scrapbooking

Introduction: My name is Dr. Pierre Goyette, I am a enchanting, powerful, jolly, rich, graceful, colorful, zany person who loves writing and wants to share my knowledge and understanding with you.