CrowdStrike Incident: Blue screen of death | EC-Council (2024)

CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload protection and endpoint security, threat intelligence, and cyberattack response services. CrowdStrike collaborates with companies like Microsoft to deploy tools such as Falcon to protect against hacking and security threats.

On Friday, July 19, 2024, CrowdStrike released a configuration update for its Falcon Sensor software, installed on Windows PCs to detect intrusions and hacking attempts. While the update was intended to bring minor improvements that customers would have barely noticed, it instead caused significant problems due to a logic error in the update software. Many computers running CrowdStrike services faced repeated reboots and the notorious Blue Screen of Death.

Impact of the Incident

The CrowdStrike update incident had a profound impact, affecting nearly 8.5 million Microsoft devices across various user groups.

The incident caused a significant IT outage that reverberated globally. Critical systems faced disruptions, leading to widespread consequences. Downtime from the outage led to significant financial losses due to halted operations, lost productivity, potential fines, and costs related to breach mitigation. According to Parametric Impact Analysis, Fortune 500 companies lost $5.4 billion in the outage (Parametrix, 2024).

In addition, trust in CrowdStrike’s reliability was undermined, affecting both the organization’s reputation and client confidence. CrowdStrike, the security company responsible for the update, experienced a sharp decline in its stock value. Shares plummeted by nearly 13% during premarket trading on Friday (McKenna, 2024).

Mac and Linux systems did not receive the update and, therefore, are not experiencing these issues.

What Affected Organizations Could Have Done Better

This incident underscores the necessity for effective patch management, incident management, and robust business continuity strategies to ensure that organizations are able to restore normal operations after an incident.

Affected organizations that faced restoration challenges struggled due to several key factors:

1. Poor Patch Management Practices

In the CrowdStrike incident, poor patch management practices played a critical role in facilitating the breach. Testing patches in a controlled environment before deployment is crucial to ensure that they do not introduce new issues and are, hence, critical.

2. Inadequate Incident Response Plan

Without a well-defined incident response plan, organizations had delayed and uncoordinated responses, exacerbating the disruption.

3. Insufficient BC/DR Preparedness

The absence of effective Business Continuity and Disaster Recovery (BC/DR) measures led to prolonged downtime and operational losses.

4. Untrained Staff

  • Lack of Training and Awareness: Inadequate training in incident response resulted in an ineffective response and exacerbated the outage’s impact.
  • Inability to Implement Mitigation Strategies: Untrained staff struggled to implement effective mitigation strategies, including system isolation and communication.

What Organizations Can Do to Prevent Similar Incidents

Preparedness and training are key. Blue team training programs such as the Certified Network Defender (C|ND), EC-Council Certified Incident Handler (E|CIH), and EC-Council Disaster Recovery Professional (E|DRP) can help organizations maintain better incident preparedness and manage the technical, administrative, and human aspects of handling such disasters.

1. Effective Patch Management

Effective patch management is a critical aspect of maintaining the security and operational continuity of any IT infrastructure. It involves the timely testing and deployment of updates and patches to software and systems to address vulnerabilities, improve performance, and enhance functionality. The workforce must be trained with comprehensive defensive training programs, such as the C|ND, which equip participants with patch management best practices, helping organizations mitigate security risks, avoid downtime, and ensure compliance with industry regulations.

2. Comprehensive Incident Handling and Response

Organizations must develop structured response plans and incident response strategies. A well-defined incident response plan includes predefined procedures for handling software conflicts and outages. This ensures that the response is swift and coordinated. Timely detection and analysis help contain the damages and achieve faster recovery. EC-Council’s E|CIH program equips students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threat actors in an incident. The program provides skills to build robust incident-handling response frameworks and best practices for handling incidents.

3. Proactive Risk Management

Proactively assessing potential risks allows organizations to recognize and address them before they escalate into serious issues. Organizations also need to learn to identify and assess risks related to updates and vendor dependencies. Training programs such as the C|ND and E|DRP provide requisite skills to anticipate threats and develop and implement strategies to mitigate or eliminate risks, such as updating security protocols or conducting regular system audits.

4. Enhanced BC/DR Planning

Effective Business Continuity and Disaster Recovery (BC/DR) planning helps minimize downtime, ensuring that essential business functions can continue or be quickly restored, reducing the impact on operations. Organizations need robust change management processes to assess the impact of updates on critical systems. Maintaining backups and redundant systems ensures continuity even during outages. Regular data backups and failover mechanisms are crucial. EC-Council’s E|DRP program provides a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing risks, and developing and implementing policies, procedures, and BC/DR plans.

5. Security Best Practices

Following security guidelines, such as timely patching, network segmentation, and access controls, helps prevent vulnerabilities that could lead to incidents. Implementing security best practices, conducting employee training, and performing mock drills are crucial for preventing cybersecurity incidents. EC-Council’s industry-recognized, accredited, and hands-on training programs can help organizations build a strong skill base and avoid such incidents as CrowdStrike.

The CrowdStrike incident highlighted how a simple issue such as a faulty update to security software could cause widespread problems. To prevent similar incidents, organizations need to implement robust patch management, comprehensive incident response plans, proactive risk management, enhanced business continuity and disaster recovery strategies, and adhere to security best practices. Training programs such as EC-Council’s Certified Network Defender (C|ND), Certified Incident Handler (E|CIH), and Disaster Recovery Professional (E|DRP) can help in maintaining better incident preparedness and managing the technical, administrative, and human aspects of such crises.

References:

Parametrix. (2024, July 24). CrowdStrike to cost Fortune 500 $5.4 billion. Parametrix. https://www.parametrixinsurance.com/in-the-news/crowdstrike-to-cost-fortune-500-5-4-billion’

McKenna, G. (2024, July 28). CrowdStrike shares slide as IT disruption continues. BBC News. https://www.bbc.com/news/articles/c725knvnk5zo

CrowdStrike Incident: Blue screen of death | EC-Council (2024)

FAQs

What is CrowdStrike incident response? ›

CrowdStrike® Incident Response Services delivers immediate threat visibility and active threat containment to eject adversaries from your network and recover your systems with speed and precision.

How did CrowdStrike outage happen? ›

As CrowdStrike immediately explained to customers and the world, the problem was not a cyberattack but an error in the software update. Because the bug was in CrowdStrike's Falcon platform update for Microsoft Windows, computers using other operating systems (e.g. Mac and Linux) were not impacted.

What caused CrowdStrike failure? ›

On July 24, CrowdStrike reported on the testing process lapses that led to the flawed update being pushed out to customer systems. In its post-mortem, the company blamed a hole in its testing software that caused its Content Validator tool to miss a flaw in the defective Channel File 291 content update.

Was the CrowdStrike update tested? ›

CrowdStrike is being sued by shareholders after a faulty update by the cybersecurity firm crashed more than eight millions computers and caused chaos around the world. The lawsuit accuses the company of making "false and misleading" statements about its software testing.

What are the 5 incident response steps? ›

Whatever method you choose, below are five important steps your cybersecurity incident response plan should cover:
  • Step 1: Preparation. ...
  • Step 2: Detection and analysis. ...
  • Step 3: Containment, eradication, and recovery. ...
  • Step 4: Post-incident activity. ...
  • Step 5: Test your incident response process.
Mar 20, 2024

What are the 7 phases of incident response? ›

The 7 steps of incident response are Preparation, Identification, Containment, Eradication, Recovery, Learning, and Re-testing. These phases provide a structure to manage the response to a cybersecurity threat in an organized way.

What exactly happened in CrowdStrike? ›

A massive technology outage linked to cybersecurity firm CrowdStrike Holdings Inc. may have been the largest tech disruption in history - and the company has tried to make up for it with some of its partners. CrowdStrike (CRWD) offered some partners a $10 Uber Eats (UBER) gift card, MarketWatch has confirmed.

Why is CrowdStrike down so much? ›

CrowdStrike shares (CRWD) have lost 28% since a bad software update from the cybersecurity company triggered a global information-technology outage.

How do I get rid of CrowdStrike? ›

Uninstall from Control Panel
  1. Open the Windows Control Panel.
  2. Click Uninstall a Program.
  3. Choose CrowdStrike Windows Sensor and uninstall it.

Who owns CrowdStrike? ›

The ownership structure of CrowdStrike Holdings (CRWD) stock is a mix of institutional, retail and individual investors. Approximately 45.23% of the company's stock is owned by Institutional Investors, 2.19% is owned by Insiders and 52.58% is owned by Public Companies and Individual Investors.

How much did the CrowdStrike outage cost? ›

The massive CrowdStrike outage that affected millions of Microsoft devices is predicted to cost U.S. Fortune 500 companies $5.4 billion in total direct financial loss, with an average loss of $44 million per Fortune 500 company, according to new data from cloud monitoring and insurance firm Parametrix.

Is CrowdStrike a malware? ›

CrowdStrike Falcon® MalQuery is an advanced, cloud-native malware research tool that enables security professionals and researchers to quickly search a massive dataset of malware samples, validating potential risks and stay ahead of would-be attackers.

Who is suing CrowdStrike? ›

The lawsuit led by the Plymouth County Retirement Association of Plymouth, Mass., seeks unspecified damages for holders of CrowdStrike Class A shares between Nov. 29, 2023 and July 29, 2024.

How do I check my CrowdStrike status? ›

How To Detect CrowdStrike Using a Fully Native osquery Implementation
  1. Identifier - The system extension identity. ( com.crowdstrike.falcon.Agent )
  2. State - The status of the extension. I.e. active and enabled or deactivated and disabled.
  3. Version - The version of the extension.
Jul 22, 2024

Who is using CrowdStrike? ›

List of companies using CrowdStrike
CompanyCountryIndustry
Integrity360IrelandIt Services And It Consulting
JSCM GroupUnited StatesIt Services And It Consulting
eSentireCanadaComputer And Network Security
Node.DigitalUnited StatesIt Services And It Consulting
6 more rows

What is the use of EDR in CrowdStrike? ›

CrowdStrike endpoint detection and response is able to accelerate the speed of investigation and ultimately, remediation, because the information gathered from your endpoints is stored in the CrowdStrike cloud via the Falcon platform, with architecture based on a situational model.

What is the meaning of incident response? ›

Incident response(IR) is the effort to quickly identify an attack, minimize its effects, contain damage, and remediate the cause to reduce the risk of future incidents. Let's Define Incident Response. Almost every company has, at some level, a process for incident response.

What is the purpose of the CrowdStrike sensor? ›

CrowdStrike Falcon analyzes connections to and from the internet to determine if there is malicious behavior. It may record the addresses of websites visited but will not log the contents of the pages transmitted. This data is used to help detect and prevent malicious actions involving websites.

Does CrowdStrike monitor activity? ›

CrowdStrike is engineered to thwart attempts at compromising computer systems by monitoring and analyzing activities. It diligently records program executions, file interactions, and network behaviors, all while ensuring the user's data remains confidential.

References

Top Articles
Latest Posts
Article information

Author: Catherine Tremblay

Last Updated:

Views: 6215

Rating: 4.7 / 5 (67 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Catherine Tremblay

Birthday: 1999-09-23

Address: Suite 461 73643 Sherril Loaf, Dickinsonland, AZ 47941-2379

Phone: +2678139151039

Job: International Administration Supervisor

Hobby: Dowsing, Snowboarding, Rowing, Beekeeping, Calligraphy, Shooting, Air sports

Introduction: My name is Catherine Tremblay, I am a precious, perfect, tasty, enthusiastic, inexpensive, vast, kind person who loves writing and wants to share my knowledge and understanding with you.