CrowdStrike explains update that crippled Windows environments

By

But says thorough root cause analysis still required.

CrowdStrike has provided its first technical explanation for a file update that bricked Windows machines worldwide.

CrowdStrike explains update that crippled Windows environments

The vendor said in a blog post that a “sensor configuration update to Windows systems … triggered a logic error resulting in a system crash and ‘blue screen of death’ (BSOD) on impacted systems.”

It “corrected the logic error by updating the content” in the configuration file but indicated that a “thorough root cause analysis” was still needed “to determine how this logic flaw occurred.”

“This effort will be ongoing,” CrowdStrike said on Saturday.

“We are committed to identifying any foundational or workflow improvements that we can make to strengthen our process.”

CrowdStrike said it typically updated configuration files - known as “channel files” in the vendor’s ecosystem - for its Falcon sensors “several times a day”.

The update that went wrong had been intended to allow CrowdStrike Falcon sensors running on endpoints “to target newly observed, malicious named pipes being used by common C2 frameworks in cyberattacks.”

A named pipe is a mechanism that is “used to transfer data between processes that are not related processes, and between processes on different computers”, Microsoft documentation states.

CrowdStrike said that “systems running Falcon sensor for Windows 7.11 and above that downloaded the updated configuration from 04:09 UTC to 05:27 UTC – were susceptible to a system crash.”

Across Australia, airlines, airports, transportation networks, supermarkets, banks and enterprises had their device fleets crash from Friday afternoon AEST.

The federal government called an emergency meeting that involved CrowdStrike representation.

IT outages were then felt in other parts of the world.

The vendor has published a long list of actions and knowledgebase articles that IT administrators can use as part of remediation efforts.

CrowdStrike also used its technical explanation blog to dispute analysis on social media that suggested that blank or null values in the configuration file were part of the problem.

"This is not related to null bytes contained within [the offending] channel file, or any other channel file," the vendor said.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Services Australia's sweeping security uplift plans for myGov

Services Australia's sweeping security uplift plans for myGov

Medibank allegedly missed EDR alerts before data breach

Medibank allegedly missed EDR alerts before data breach

Northern Beaches Council reviews security stack to shore up widening perimeter

Northern Beaches Council reviews security stack to shore up widening perimeter

CrowdStrike rejects Delta Air Lines claims over outage

CrowdStrike rejects Delta Air Lines claims over outage

Log In

  |  Forgot your password?