The July 19th Crowdstrike Windows outage has impacted about 8.5 million devices globally, causing entire business sectors to grind to a halt. A faulty software update led to a cascade of systems failures among airlines, financial institutions, healthcare organizations, and more.
On July 19th 2024, Crowdstrike released a configuration update to its Falcon platform. This routine update was supposed to improve sensor performance, but it contained a critical logic error causing affected systems to crash.
The outage is not a cyberattack, and has no connection to threat actor activity. However—threat actors are actively exploiting the situation, creating spoof Crowdstrike domains and distributing malware with misleading filenames like “crowdstrike-hotfix.zip”.
The critical logic error is contained in a series of configuration files called Channel Files. Each file has a unique identifier. The file that caused the outage is C-00000291.sys. Even though it ends with a .sys extension, the file is not a kernel driver.
All devices running Falcon sensor for Windows version 7.11 and above that were online on Friday, July 19th 2024 between 04:09 UTC and 05:27 UTC may be affected. Windows systems that downloaded and ran the update during this time may have crashed and become inoperable.
Crowdstrike released a fixed update at 05:27 UTC, so any device not already impacted by this time received the updated configuration file. Devices using Max, Linux, and other operating systems are not affected.
Imagine relying solely on CrowdStrike (EDR) for your security visibility. At Lumifi, we advocate for the SOC Visibility Triad, which includes EDR, NDR, and SIEM. We believe that most companies should implement all three for robust protection. Losing one of these tools temporarily is a manageable disruption, but losing your only security tool, even briefly, can leave you vulnerable. Diversify your security tools—don't let a single vendor blind you!
Crowdstrike has already published a workaround for the outage, which involves manually rebooting each machine into safe mode. Here are some things Crowdstrike customers can do right now to help remediate the issue:
In a complex enterprise IT environment, recovering from a large-scale outage is easier said than done. IT leaders must create action plans that address immediate, mid-term, and long-term risks associated with the event:
Each of these steps relies on having unlimited visibility and control over your IT environment. When security teams run into issues accessing IT assets or conducting discovery of the environment, it makes remediating complex issues that much harder.
Managing a disruptive, large-scale event is no easy task. Even well-prepared enterprise IT teams can be quickly overwhelmed by the sheer volume of issues that arise in these scenarios. Security leaders who partner with reputable MDR vendors like Lumifi gain access to scalable product expertise they can rely on when it matters most.
Subscribe to Lumifi's Daily Cybersecurity News Curated by a CISO
We’ve expanded our MDR capabilities with enhanced incident response and security services to better protect against evolving cyber threats.