What is CrowdStrike, and how did it cripple so many computers? (2024)

Talk about irony: The software that paralyzed Windows computers around the world late Thursday night and early Friday morning was planted by a company that protects Windows computers against malware.

That company is CrowdStrike, a publicly traded cybersecurity firm based in Austin, Texas. It acknowledged the problem around 11 p.m. Thursday and started working on a solution, offering a work-around in the wee hours Friday and a fix a few hours later.

The vast sea of “blue screens of death” triggered by CrowdStrike’s error is a testament to the market-leading status of the company’s software, which detects and defends against malicious code planted by hackers. Its approach is known as “endpoint security” because it installs its defenses on devices that connect to the internet, such as computers and smartphones.

Advertisem*nt

According to the website 6sense.com, CrowdStrike has more than 3,500 customers, which represent about 1 out of 4 companies buying endpoint security. Although most of its customers are based in the United States, it has hundreds in India, Europe and Australia, 6sense reports.

Here’s a quick explanation for how things went wrong so quickly for so many Windows users around the world, including airlines, hospitals, banks and government agencies.

California

From LAX to hospitals to Starbucks, global tech outage brings chaos and frustration

The software issue was part of an update from cybersecurity company CrowdStrike, which protects computers for many of the biggest companies in the world.

July 19, 2024

The Falcon Sensor update

One of the selling points of CrowdStrike service is that it can improve its defenses rapidly as new threats are discovered. As part of that service, it continuously and automatically updates the Falcon Sensor software on its customers’ machines.

Automatic updates are, under normal circ*mstances, a good cybersecurity practice because they prevent clients from having machines with outdated defenses on their networks. But the latest incident reveals the flip side of the coin.

According to CrowdStrike, the problem was triggered by a “single content update” for its customers with Windows PCs. The buggy code wasn’t detected until after it had been downloaded and installed on many of CrowdStrike’s clients’ machines.

Once loaded, the bad update interfered with core functions of the PC, causing Microsoft’s infamous blue error screen to pop up and convey a message along the lines of, “Your PC ran into a problem and needs to restart.” And as long as the update remained in place, restarting the machine led to the same errant result.

The fix offered by CrowdStrike

CrowdStrike stopped sending out the faulty update early Friday morning, so machines that had not loaded it yet were spared the turmoil.

For machines caught in the cycle of blue-screen hell, the company initially offered step-by-step instructions for how to reboot Windows in a mode that would allow them to find and delete the buggy update. The drawback, as many commenters online noted, is that this machine-by-machine approach isn’t much help for organizations with hundreds or thousands of bricked PCs.

Business

Global IT collapse puts cyber firm CrowdStrike in spotlight

Behind a massive IT failure that grounded flights, upended markets and disrupted corporations around the world is one cybersecurity company: CrowdStrike Holdings Inc.

July 19, 2024

According to the tech website 404, Microsoft also suggested that rebooting a crashed machine multiple times — as many as 15 — could solve the problem.

Within a few hours, CrowdStrike was distributing a piece of software that removed the buggy code. This worked only for customers whose machines were able to connect to the internet and download the fix, though; everyone else would be left with the PC-by-PC work-around.

Scammers jump in

CrowdStrike Chief Executive George Kurtz issued an apology late Friday morning, promising that the company would “provide full transparency on how this occurred and steps we’re taking to prevent anything like this from happening again.” He also warned that bad actors online would try to take advantage of the incident, urging customers to be on the lookout and “ensure that you’re engaging with official CrowdStrike representatives.”

Sure enough, the company announced two hours later that it had found numerous instances of scammers trying to lure victims by posing as CrowdStrike technical support in emails or phone calls. Others were “posing as independent researchers, claiming to have evidence the technical issue is linked to a cyberattack and offering remediation insights.” And yet more were making bogus offers to sell software to fix the problem, the company said.

Advertisem*nt

CrowdStrike identified at least 30 malicious websites that were involved in these cons.

Researchers at the internet security company Norton also warned about the emergence of fake domains and impersonation scams tied to the incident.

“Scammers can leverage social ads, emails and text messages to drive people to the bogus sites,” Norton warned. “These sites look legitimate and aim to extort personal or financial information, preying on the fear and doubt people may have related to the incident. Moreso, many times, fake domains have high search rankings, which can make them appear more credible.”

In an impersonation scam, con artists may send messages mimicking CrowdStrike’s branding to potential victims, claiming that they have been affected by the incident. The messages direct people to a fraudulent customer support line or web page, with a goal of stealing money or sensitive personal information, Norton said.

“This should serve as a cautionary tale, reminding people worldwide to remain extra vigilant as scammers use every angle and method to exploit them,” Luis Corrons, a Norton security evangelist, said in a statement.

The lessons from the CrowdStrike debacle

Some Macintosh and Linux users, who were immune to the CrowdStrike-induced upheaval, devoted a portion of their morning Friday to spiking the football on Windows, even though the problem wasn’t caused by Microsoft.

Other observers argued that the incident demonstrated the risk of having one potential point of failure affecting millions of computers — a problem that has been demonstrated repeatedly during the broadband era.

Advertisem*nt

Transportation Secretary Pete Buttigieg made a similar point at a news conference Friday in East Los Angeles. “A lot of people around the country and around the world are shocked to discover that a single issue with a single piece of software can have that many knock-on implications. So ... that’ll be a question that really goes to the design of our systems for the long term,” Buttigieg said.

“As a recovering computer science major,” Rep. Ted Lieu (D-Torrance) said on X, “I’m not surprised a faulty update by CrowdStrike took down Microsoft Windows. Always risks in giving another software program full or near full access to an operating system.”

For the record:

12:26 p.m. July 19, 2024An earlier version of this story reported that Steve Garrison was founder of Stellar Cyber in San Francisco. He is one of the founders, and the company is based in San Jose.

Steve Garrison, one of the founders of Stellar Cyber in San Jose, said it’s more important to figure out how to make improvements than to play the blame game. This incident, he said, underscores the need for companies to spend plenty of time checking the quality of their products in a controlled environment before releasing them to customers.

Another lesson, he said, is the need for companies, their competitors and their customers to work together as a community to spot problems. “What do we need to do to check the checkers of our supply chain?” he asked.

Politics

Will hackers, trolls and AI deepfakes upset the 2024 election?

AI is bending reality into a video game world of deepfakes to sow confusion and chaos during the 2024 election. Disinformation is a danger, especially in swing states.

April 30, 2024

Dan O’Dowd, a developer of security software for the military, said the fiasco demonstrates that we need better software in critical systems.

“The immense body of software developed using Silicon Valley’s ‘move fast and break things’ culture means that the software our lives depend on is riddled with defects and vulnerabilities,” O’Dowd said in a statement. “Defects in this software can result in a mass failure event even more serious than the one we have seen today.”

He added, “We must convince the CEOs and Boards of Directors of the companies that build the systems our lives depend on to rewrite their software so that it never fails and can’t be hacked. ... These companies will not take cybersecurity seriously until the public demands it. And we must demand it now, before a major disaster strikes.”

More to Read

  • Opinion: The CrowdStrike outage shows the danger of depending on Big Tech overlords

    July 23, 2024

  • Column: The CrowdStrike meltdown reminds us that the hacking problem doesn’t come only from outside

    July 23, 2024

  • L.A. County Superior Court hit by ransomware attack

    July 19, 2024

What is CrowdStrike, and how did it cripple so many computers? (2024)

FAQs

What is CrowdStrike, and how did it cripple so many computers? ›

On 19 July 2024, American cybersecurity company CrowdStrike distributed a faulty update to its Falcon Sensor security software that caused widespread problems with Microsoft Windows computers running the software.

What is CrowdStrike and how does it work? ›

CrowdStrike is a web/cloud based anti-virus which uses very little storage space on your machine. CrowdStrike installs a lightweight sensor on your machine that is less than 5MB and is completely invisible to the end user.

What caused the CrowdStrike outage? ›

CrowdStrike blamed the recent outage on an issue in its testing software, which allowed a bug to be released, causing Falcon to malfunction. Cable said 5,000 Microsoft support engineers had been working around the clock since the outage “to help bring critical services back online”.

How did CrowdStrike take down Windows? ›

Channel File 291 contained problematic content, which caused affected Windows systems to crash due to an out-of-bounds memory read. Systems that were not online during this time window were not impacted. Mac and Linux devices were not impacted.

When did the CrowdStrike incident start? ›

The faulty update on 19 July crashed 8.5 million Microsoft Windows computers around the world. The outage disrupted businesses and services, including airlines, banks and hospitals. In a detailed review of the incident, CrowdStrike said there was a "bug" in a system designed to ensure software updates worked properly.

What is so special about CrowdStrike? ›

CrowdStrike is unique due to its cloud-native architecture and proactive threat hunting capabilities. These features enable quick deployment, scalability, and real-time response, making CrowdStrike a standout choice for organizations seeking advanced endpoint protection.

What is the CrowdStrike issue? ›

On 19 July 2024, American cybersecurity company CrowdStrike distributed a faulty update to its Falcon Sensor security software that caused widespread problems with Microsoft Windows computers running the software.

Why is CrowdStrike down so much? ›

Shares of CrowdStrike continue to fall following the company's software glitch. July was a pretty bad month for CrowdStrike (CRWD 1.91%) investors. The cybersecurity company has found itself in both a product-oriented and public relations disaster following an identified bug in a recent software update.

How do I get rid of CrowdStrike? ›

Uninstall from Control Panel
  1. Open the Windows Control Panel.
  2. Click Uninstall a Program.
  3. Choose CrowdStrike Windows Sensor and uninstall it.

Who is suing CrowdStrike? ›

Aug 5 (Reuters) - CrowdStrike's (CRWD.O) , opens new tab legal troubles from last month's massive global computer outage deepened on Monday, as the cybersecurity company was sued by air travelers whose flights were delayed or canceled.

Who owns CrowdStrike? ›

The ownership structure of CrowdStrike Holdings (CRWD) stock is a mix of institutional, retail and individual investors. Approximately 45.70% of the company's stock is owned by Institutional Investors, 2.19% is owned by Insiders and 52.11% is owned by Public Companies and Individual Investors.

Is CrowdStrike an Israeli company? ›

Beyond the business rivalry, CrowdStrike is part of an exit strategy for many Israeli cybersecurity startups. The American company, which has a $4 billion reserve and wants to expand its solution portfolio, has become a target for Israeli venture capital funds looking for a buyer for their offerings.

What companies use CrowdStrike? ›

List of companies using CrowdStrike
CompanyCountryIndustry
MindPoint Group, LLCUnited StatesComputer And Network Security
CyderesUnited StatesComputer And Network Security
StratascaleIt Services And It Consulting
GuidePoint SecurityUnited StatesIt Services And It Consulting
6 more rows

Can CrowdStrike see browsing history? ›

CrowdStrike Falcon analyzes connections to and from the internet to determine if there is malicious behavior. It may record the addresses of websites visited but will not log the contents of the pages transmitted.

Does the government use CrowdStrike? ›

Crowdstrike is in wide use across federal agencies and it is a key vendor on the governmentwide Continuous Diagnostics and Mitigation cybersecurity support services contract.

How many devices are affected by CrowdStrike? ›

CrowdStrike IT outage affected 8.5 million Windows devices, Microsoft says. Microsoft says it estimates that 8.5m computers around the world were disabled by the global IT outage. It's the first time a figure has been put on the incident and suggests it could be the worst cyber event in history.

Does CrowdStrike monitor activity? ›

CrowdStrike is engineered to thwart attempts at compromising computer systems by monitoring and analyzing activities. It diligently records program executions, file interactions, and network behaviors, all while ensuring the user's data remains confidential.

How does CrowdStrike detect virus? ›

CrowdStrike does not scan the contents of data files, websites, email messages, IM/Chat communications and does not perform keystroke logging. Crowdstrike does identify malicious use of legitimate programs by analyzing executable files, scripts, and the context within which these files and scripts are used.

Is CrowdStrike a firewall? ›

What is Falcon Firewall Management? Falcon Firewall Management delivers simple, centralized firewall management making it easy to manage and enforce firewall policies.

What products does CrowdStrike sell? ›

Falcon Enterprise
  • Falcon Prevent. Next-generation antivirus. ...
  • Falcon Device Control. USB device control. ...
  • Falcon Firewall Management. Host firewall control. ...
  • Falcon Adversary OverWatch. Threat hunting and intelligence. ...
  • Falcon Insight XDR. Detection & response. ...
  • Falcon Discover. ...
  • Falcon Identity Protection. ...
  • CrowdStrike Services.

Top Articles
Latest Posts
Article information

Author: Prof. Nancy Dach

Last Updated:

Views: 6695

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Prof. Nancy Dach

Birthday: 1993-08-23

Address: 569 Waelchi Ports, South Blainebury, LA 11589

Phone: +9958996486049

Job: Sales Manager

Hobby: Web surfing, Scuba diving, Mountaineering, Writing, Sailing, Dance, Blacksmithing

Introduction: My name is Prof. Nancy Dach, I am a lively, joyous, courageous, lovely, tender, charming, open person who loves writing and wants to share my knowledge and understanding with you.