CrowdStrike Reveals What Happened, Why—And What’s Changed (2024)

Nearly three weeks after a botched CrowdStrike update caused one of the biggest IT outages in history, the firm has published its in-depth investigation into what happened and why. CrowdStrike’s Root Cause Analysis report elaborates on the information previously shared in its preliminary Post Incident Review.

In its new post mortem report, CrowdStrike delves deeper into the root causes of the error that led Windows machines to display blue screen of death—and admits its testing process left a lot to be desired.

The firm has certainly faced a tough time in the weeks since the outage, after it was sued by investors last week. CrowdStrike and the CEO of Delta are also exchanging words after the airline blamed the security company for $500 million of losses.

What Happened

In its RCA, the firm describes how its CrowdStrike Falcon sensor “delivers AI and machine learning to protect customer systems by identifying and remediating the latest advanced threats.”

The problem that led to the outage stems from a new feature that was added to its sensor in February, “to enable visibility into possible novel attack techniques that may abuse certain Windows mechanisms.”

MORE FROMFORBES ADVISOR

Best High-Yield Savings Accounts Of 2024ByKevin PayneContributor
Best 5% Interest Savings Accounts of 2024ByCassidy HortonContributor

This capability, which used a pre-defined a set of fields for Rapid Response Content to gather data, was developed and tested according to the firm’s “standard software development processes.”

But these do not appear to have been good enough to catch the issue.

“On March 5, 2024, following a successful stress test, the first Rapid Response Content for Channel File 291 was released to production as part of a content configuration update, with three additional Rapid Response updates deployed between April 8, 2024 and April 24, 2024,” CrowdStrike said. These “performed as expected” in production.

However, on July 19, 2024, a Rapid Response Content update was delivered to certain Windows hosts, “evolving the new capability first released in February 2024.”

The sensor expected 20 input fields, but the update provided 21 input fields. “In this instance, the mismatch resulted in an out-of-bounds memory read, causing a system crash,” CrowdStrike wrote.

This scenario with Channel File 291 is now “incapable of recurring,” CrowdStrike said, adding that what happened is now informing how it tests things going forward.

ForbesMicrosoft Confirms New Outage Was Triggered By CyberattackBy Kate O'Flaherty

What’s Next, According To The Root Cause Analysis

Based on the findings in the RCA, CrowdStrike said it will update content configuration system test procedures, including upgraded tests for template type development, with “automated tests for all existing template types.”

It’s also adding deployment layers and acceptance checks for the content configuration system.

A lot of people have complained about not having the ability to control updates. From now, CrowdStrike will provide customers additional control over the deployment of Rapid Response Content updates.

Meanwhile, it will prevent the creation of problematic Channel 291 files by implementing validation for the number of input fields.

CrowdStrike will also implement additional checks in the content validator and enhance bounds checking in the content interpreter for Rapid Response Content in Channel File 291.

Finally, it will engage “two independent third-party software security vendors” to conduct further review of the Falcon sensor code and quality control and release processes.

“Looking ahead, CrowdStrike is focused on using the lessons learned from this incident to better serve our customers,” the firm said in an emailed statement. “CrowdStrike remains steadfast in our mission to protect customers and stop breaches.”

Experts Have Their Say

The RCA is a long document—12 pages to be precise—but experts have praised CrowdStrike for being transparent about what happened on July 19. “It is positive they have been transparent and that they are taking this seriously,” says cybersecurity consultant Daniel Card.

Yet point six of the RCA, “template instances should have a staged deployment” seems to have garnered the attention of cybersecurity experts.

As a result of its RCA investigation, CrowdStrike says its content configuration system has been updated “with additional deployment layers and acceptance checks.” In other words, it will now deploy canary testing and roll things back if issues are found. At the same time, customers can now choose where and when Rapid Response Content updates like the one that caused the crash are deployed.

However, Card points out a company deploying globally to military, critical national infrastructure and governments should have had a robust test process in place in the first instance. “I'm happy to see they are going to change the design to be what it should have had in the first place.”

He points out the critical balance CrowdStrike needed to manage. “When you run this type of software, you can't be taking risks. Releasing globally without adequate testing is not a risk you want to be taking lightly as a company, but that seems to have been the design.”

The report shows that the problem wasn’t that the update was malformed—or that that the validator didn’t catch the error before it was deployed, Florian Roth, head of research at Nextron Systems, a competitor of CrowdStrike, wrote on X, formerly Twitter. “The real problem is that they didn’t have any canary system to which they deployed the update before rolling it out to millions of endpoints all at once.”

CrowdStrike has hit back at Roth’s claims. “Since our founding, we have always put customer protection at the forefront, and that continues to be our singular focus,” a CrowdStrike spokesperson wrote on an email.

“As we describe in the RCA, the parameter count mismatch evaded the multiple layers of build validation and testing in our process. The RCA also describes the process improvements and mitigation steps that CrowdStrike is deploying to ensure further enhanced resilience.”

The changes to its processes come better late than never, but the general feeling seems to be that CrowdStrike shouldn’t have been in this situation in the first place.

CrowdStrike Reveals What Happened, Why—And What’s Changed (2024)

FAQs

What exactly went wrong with CrowdStrike? ›

The root cause of the outage was a faulty sensor configuration update that specifically affected Windows systems. The channel file 291 update was never issued to macOS or Linux systems as the update deals with named pipe execution that only occurs on the Microsoft Windows OS.

What actually happened at CrowdStrike? ›

On 19 July 2024, American cybersecurity company CrowdStrike distributed a faulty update to its Falcon Sensor security software that caused widespread problems with Microsoft Windows computers running the software.

What exactly happened with the CrowdStrike outage? ›

The world just experienced a widespread technical outage linked to a company called CrowdStrike. What exactly happened on Friday, July 19, 2024? Cybersecurity firm CrowdStrike pushed out a routine software update that inadvertently crashed customers' Windows systems.

What was the cause of the CrowdStrike failure? ›

Microsoft confirms the analysis done by CrowdStrike last week. The crash was due to a read-out-of-bounds memory safety error in CrowdStrike's CSagent. sys driver. So they are saying something else caused the first blue screen, which corrupted the file, which causes every subsequent blue screen.

Why is CrowdStrike falling? ›

While investors were sleeping, CrowdStrike released a defective update to its software that caused Microsoft-based IT systems to go down. The outage was perhaps most notable for airlines, which were forced to cancel and delay flights.

What is the problem with CrowdStrike and Microsoft? ›

CrowdStrike blamed testing software for taking down 8.5 million Windows machines last month, but now a full root cause analysis offers more details. The main issue was a mismatch between the input fields expected by CrowdStrike's Falcon driver and the ones supplied in a content update.

What was wrong in the CrowdStrike update? ›

CrowdStrike pushed a sensor configuration update for Windows systems that caused a logic error, resulting in the infamous BSOD. Any computer that was running Falcon sensor for Windows version 7.11 and above that was online from when the update was pushed live to when the update was ceased may have been affected.

Can CrowdStrike spy on me? ›

CrowdStrike Falcon analyzes connections to and from the internet to determine if there is malicious behavior. It may record the addresses of websites visited but will not log the contents of the pages transmitted.

What is the root cause of the CrowdStrike incident? ›

CrowdStrike has published its root cause analysis about the update crash that turned off millions of Microsoft Windows devices globally. The crash occurred because there was a mismatch between the 21 inputs passed to the CrowdStrike content validator and the 20 supplied to the content interpreter.

What is the CrowdStrike issue in a nutshell? ›

At issue was a flawed update to CrowdStrike Falcon, the company's popular endpoint detection and response (EDR) platform, which crashed Windows machines and sent them into an endless reboot cycle, taking down servers and rendering 'blue screens of death' on displays across the world.

How did CrowdStrike break the internet? ›

On July 19, a routine software update from cybersecurity giant CrowdStrike unleashed digital chaos across the globe, exposing the fragility of interconnected IT networks. Within hours, Windows-based systems worldwide crashed, displaying the dreaded “blue screen of death,” affecting 8.5 million devices globally.

Does the US government use CrowdStrike? ›

Get the latest federal technology news delivered to your inbox. The extent of the impact on federal government operations is still not known. Crowdstrike is in wide use across federal agencies and it is a key vendor on the governmentwide Continuous Diagnostics and Mitigation cybersecurity support services contract.

Can CrowdStrike survive? ›

CrowdStrike will likely survive and move forward, but, reputationally, it can't afford another incident like this, said William MacMillan, a former CISO at the CIA.

What's the deal with CrowdStrike? ›

CrowdStrike's preliminary investigation has now identified the source of the outage as a cloud-delivered, rapid response update to the Falcon sensor. CrowdStrike uses these updates to identify new indicators of threat actor behaviour, and improve its detection and prevention capabilities.

Will CrowdStrike recover? ›

CrowdStrike Stock And The Long Road To Recovery

Analysts and crisis management counselors agree potential litigation stands as one element that will prevent the company, and CrowdStrike stock, from completely recovering for some time. The company contends it is operating as normal.

Why was the CrowdStrike update faulty? ›

CrowdStrike Holdings Inc. has shared new details about the faulty update that it rolled out to its Falcon cybersecurity platform last week. In a preliminary incident report released today, the company revealed that the update caused a type of error known as an out-of-bounds memory read.

Why is CrowdStrike so low? ›

However, investors began to question their thesis after a software update for its Microsoft-based systems led to a massive global IT outage. Amid the fallout, CrowdStrike stock dropped 11% on Friday and another 13% in Monday's trading session.

What are analysts saying about CrowdStrike? ›

Based on 40 Wall Street analysts offering 12 month price targets for CrowdStrike Holdings in the last 3 months. The average price target is $325.17 with a high forecast of $420.00 and a low forecast of $265.00. The average price target represents a 31.87% change from the last price of $246.58.

How much did the CrowdStrike outage cost? ›

CrowdStrike outage will cost Fortune 500 companies $5.4 billion in damages | Fortune.

Top Articles
C. diff (C. difficile Colitis) Symptoms, Treatment, Antibiotics
Biliary Tract Disorders, Gallbladder Disorders, & Gallstone Pancreatitis | ACG
What Did Bimbo Airhead Reply When Asked
Pollen Count Los Altos
Room Background For Zepeto
Rabbits Foot Osrs
La connexion à Mon Compte
Flixtor The Meg
Gabrielle Abbate Obituary
Lexington Herald-Leader from Lexington, Kentucky
Aces Fmc Charting
Clairememory Scam
Iron Drop Cafe
Turbocharged Cars
Red Tomatoes Farmers Market Menu
I Wanna Dance with Somebody : séances à Paris et en Île-de-France - L'Officiel des spectacles
Mills and Main Street Tour
Walmart End Table Lamps
Arboristsite Forum Chainsaw
Kvta Ventura News
Enterprise Car Sales Jacksonville Used Cars
Tamilrockers Movies 2023 Download
Hellraiser III [1996] [R] - 5.8.6 | Parents' Guide & Review | Kids-In-Mind.com
Craigslist Pinellas County Rentals
Curry Ford Accident Today
X-Chromosom: Aufbau und Funktion
Rural King Credit Card Minimum Credit Score
Aldi Bruce B Downs
Best Transmission Service Margate
Best Nail Salons Open Near Me
Shadbase Get Out Of Jail
Ceramic tiles vs vitrified tiles: Which one should you choose? - Building And Interiors
Which Sentence is Punctuated Correctly?
Macu Heloc Rate
What Individuals Need to Know When Raising Money for a Charitable Cause
Phone number detective
Culver's Hartland Flavor Of The Day
Babylon 2022 Showtimes Near Cinemark Downey And Xd
How to Draw a Sailboat: 7 Steps (with Pictures) - wikiHow
Vocabulary Workshop Level B Unit 13 Choosing The Right Word
Husker Football
2007 Peterbilt 387 Fuse Box Diagram
Amc.santa Anita
Honkai Star Rail Aha Stuffed Toy
Yourcuteelena
Ts In Baton Rouge
RubberDucks Front Office
Unblocked Games 6X Snow Rider
Msatlantathickdream
Ingersoll Greenwood Funeral Home Obituaries
Denys Davydov - Wikitia
How to Choose Where to Study Abroad
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 5668

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.