iTnews
  • Home
  • News
  • Technology
  • Security

CrowdStrike explains update that crippled Windows environments

By Ry Crozier
Jul 20 2024 12:23PM

But says thorough root cause analysis still required.

CrowdStrike has provided its first technical explanation for a file update that bricked Windows machines worldwide.

CrowdStrike explains update that crippled Windows environments

The vendor said in a blog post that a “sensor configuration update to Windows systems … triggered a logic error resulting in a system crash and ‘blue screen of death’ (BSOD) on impacted systems.”

It “corrected the logic error by updating the content” in the configuration file but indicated that a “thorough root cause analysis” was still needed “to determine how this logic flaw occurred.”

“This effort will be ongoing,” CrowdStrike said on Saturday.

“We are committed to identifying any foundational or workflow improvements that we can make to strengthen our process.”

CrowdStrike said it typically updated configuration files - known as “channel files” in the vendor’s ecosystem - for its Falcon sensors “several times a day”.

The update that went wrong had been intended to allow CrowdStrike Falcon sensors running on endpoints “to target newly observed, malicious named pipes being used by common C2 frameworks in cyberattacks.”

A named pipe is a mechanism that is “used to transfer data between processes that are not related processes, and between processes on different computers”, Microsoft documentation states.

CrowdStrike said that “systems running Falcon sensor for Windows 7.11 and above that downloaded the updated configuration from 04:09 UTC to 05:27 UTC – were susceptible to a system crash.”

Across Australia, airlines, airports, transportation networks, supermarkets, banks and enterprises had their device fleets crash from Friday afternoon AEST.

The federal government called an emergency meeting that involved CrowdStrike representation.

IT outages were then felt in other parts of the world.

The vendor has published a long list of actions and knowledgebase articles that IT administrators can use as part of remediation efforts.

CrowdStrike also used its technical explanation blog to dispute analysis on social media that suggested that blank or null values in the configuration file were part of the problem.

"This is not related to null bytes contained within [the offending] channel file, or any other channel file," the vendor said.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
bsodcrowdstrikeexplanationsecuritytechnical

Related Articles

  • GPS spoofers 'hack time' on commercial airlines, researchers say GPS spoofers 'hack time' on commercial airlines, researchers say
  • In Pictures: Skybox and BT security roundtable In Pictures: Skybox and BT security roundtable
  • Browser vulnerability can be used to breach local networks Browser vulnerability can be used to breach local networks
  • Services Australia's sweeping security uplift plans for myGov Services Australia's sweeping security uplift plans for myGov

Partner Content

‘Work Anywhere, Thrive Everywhere’: Embracing Boundless Workplaces in a Changing World
Partner Content ‘Work Anywhere, Thrive Everywhere’: Embracing Boundless Workplaces in a Changing World
Dual Challenge: Securing Modern Enterprises While Enabling Remote Work
Partner Content Dual Challenge: Securing Modern Enterprises While Enabling Remote Work
SOCO Reveals Microsoft AI with Power Platform Use Cases at Upcoming Government Event
Partner Content SOCO Reveals Microsoft AI with Power Platform Use Cases at Upcoming Government Event
Transforming Education: South Australia's Digital Identity Journey with Okta
Partner Content Transforming Education: South Australia's Digital Identity Journey with Okta

Sponsored Whitepapers

Nine Ways To Prepare Your Database for a High-Traffic Event
Nine Ways To Prepare Your Database for a High-Traffic Event
How to Put AI at the Heart of Business Growth
How to Put AI at the Heart of Business Growth
Streamline Your Processes and Reduce Managed File Transfer Expenses
Streamline Your Processes and Reduce Managed File Transfer Expenses
Maximise Your Azure Investment with Fusion5
Maximise Your Azure Investment with Fusion5
CyberArk's 2024 Playbook: Identity Security and Cloud Compliance
CyberArk's 2024 Playbook: Identity Security and Cloud Compliance

Events

  • Integrate Integrate
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Services Australia's sweeping security uplift plans for myGov

Services Australia's sweeping security uplift plans for myGov

Medibank allegedly missed EDR alerts before data breach

Medibank allegedly missed EDR alerts before data breach

Northern Beaches Council reviews security stack to shore up widening perimeter

Northern Beaches Council reviews security stack to shore up widening perimeter

CrowdStrike rejects Delta Air Lines claims over outage

CrowdStrike rejects Delta Air Lines claims over outage

Digital Nation

How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
State of Security 2023
State of Security 2023
More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.