The Netify research team have documented the key areas IT decision makers need to consider when buying SD-WAN and Network Security.

Blog Categories
Back

View all Netify blog categories

The Netify blog contains a wealth of data and guidance for IT decision makers researching SD-WAN and Network Security.

Learn More

Get a Zoom walkthrough of Netify

Join us for 30 minutes on Zoom, we'll walk you through how we can help your business with SD WAN and SASE Cybersecurity for free.

Netify is the first marketplace with a focus on SD WAN & SASE Cybersecurity. We employ researchers to list Gartner leaders, niche players and startups across WAN and security. The Netify advisory is available for free to help make sense of the decision making process by offering vendor briefings and tools to help your business find the right solution fit.

What caused the worldwide CrowdStrike Windows issues?

What caused the worldwide CrowdStrike Windows issues?

Let vendors and managed service providers bid for your business

Receive product information, pricing, and sales demos across 150 vendors and managed providers. Add your project to the marketplace, we'll send you a secure password protected login to your very own page.

List your opportunity now

Widespread outages are being experienced worldwide, affecting a wide range of Windows devices. The source of the issue being a faulty update from the cybersecurity provider CrowdStrike to their Falcon Sensor software, which is widely used to manage the cybersecurity of both Windows PCs and servers. Having started affecting devices as of 19th July 2024, the update is causing Windows PCs to crash and experience the ‘Blue Screen of Death’ (BSOD) error, getting stuck into boot loops and ultimately rendering systems unusable. So far, a reported 8.5 million Windows devices have been affected globally by the issues and has caused significant impact across various sectors, despite this figure representing less than 1% of all Windows machines.

Impact

Having already affected much of Australia’s banks, airlines and TV broadcasters, businesses across Europe have begun their working day and are also now reporting similar issues. The breadth of this issue hasn’t fully yet been recognised with retailers, and even emergency services in various countries such as the United States, United Kingdom, Australia, and India all facing issues due to the downtime.

CrowdStrike's Response

CrowdStrike has now acknowledged the problem and, after investigating the cause of the outage, have concluded that the issue was related to "Channel Files" within the Falcon sensor's behavioural protection mechanisms. These updates, although not kernel drivers, influenced systems startup processes, which led to the BSOD issues. 

Earlier findings appeared to show that the issue stemmed from the related csagent.sys driver in multiple versions of CrowdStrike's Falcon sensor software and thus a short term fix had previously been suggested with regards to this driver.

Short-Term Fix

Businesses experiencing this issue will undoubtedly be looking for any method to regain access to their systems and, as a short-term solution, CrowdStrike has suggested the best workaround currently is to boot affected systems into Safe Mode or the Windows Recovery Environment, locating and deleting the problematic driver file, and then rebooting normally.

CrowdStrike_BSOD_Workaround

Long-Term Fix

To aid with recovery, Microsoft has developed a new tool designed to assist affected systems. This tool aims to accelerate the recovery process, especially for critical sectors like healthcare, which have been severely impacted by the outage​​. Additionally, CrowdStrike and Microsoft are actively working with affected customers to mitigate the issue and restore normal operations​, with Microsoft deploying engineers to assist customers resolve issues.

Cautions

Amongst the panic to get systems back online, malicious actors have been reportedly exploiting the situation, providing affected customers with malware disguised as official CrowdStrike fixes. The malware, known as Daolpu has been sent. to customers in phishing emails, designed for users to install it onto their computer, allowing Daolpu to steal information. This information includes account credentials, browser histories and authentication cookies, which can cause major damage to affected users and systems. CrowdStrike has warned their customers that they must ensure they are communicating with official representatives and following the provided technical guidance in order to protect their business network.

Implications

Whilst we won’t know the full implications straight away, this incident highlights the risks associated with relying on a single cybersecurity vendor and underscores the fragility of business computer infrastructure.

As organisations work to resolve the issues caused by the CrowdStrike outage, we’ll look to provide you with any updates as new information becomes available.

Get SD-WAN and Network Security bids from Vendors & Managed Service Providers

Netify connects IT decision-makers with over 150 vendors and managed service providers across the UK and North America. By listing your project, you'll receive a secure, password-protected login to access competitive solution bids and pricing, streamlining your decision-making process.

List your opportunity now

Suggested Posts

Explore Topics

Popular Article Topics

Find articles and helpful resources about any of the following:

Subscribe to Notifications

The Netify Learning Center

Learn more about comparison of SD WAN and SASE Cybersecurity with the Netify Learning Center.

See All Articles

Download the SD WAN Playbook

A comparison of SD WAN vendors & providers distilled into one page.

With the key features you should consider. And, build a vendor shortlist in less than 60 seconds with our comparison tool.