If your company is still working to recover from the CrowdStrike outage, please reach out to success@zipsec.com for assistance. We’re happy to provide help and advice to impacted companies.
CrowdStrike made headlines early Friday morning as a routine content upgrade pushed bad code to an estimated 8.5 million Windows devices worldwide. A .sys file with problematic content was automatically pushed to Windows PCs running the CrowdStrike Falcon security software, causing systems to display the Blue Screen of Death (BSOD) and enter a boot loop once downloaded. While CrowdStrike was quick to correct the .sys file, the initial error affected the kernel code at the core of operating systems, crashing devices and leaving them unable to reconnect to the internet. This prevented devices from accessing the update automatically through the network, making it necessary for users to manually apply a fix.
For more information, we recommend CrowdStrike’s technical overview published on 7/20 and their preliminary post incident review published on 7/24.
Experts have placed early estimates on impact as a result of the bug as high as $5.4 billion as disruption continued through early this week. Businesses of all sizes and sectors were affected by the bug, including hospitals, banks, factories, airlines, retail stores, and more, highlighting how software dependent the economy is. As of the stock market close on Wednesday, 7/24, CrowdStrike stock prices had dropped 27%.
CrowdStrike support and cybersecurity and IT communities across the globe joined together to troubleshoot in the wake of the outage. There were three remediation recommendations that we posted in full on our website on Friday morning:
Zip Security worked with customers early Friday morning to get affected devices back online, closing out most active tickets by 2pm ET. Bitlocker keys managed by Zip were sent to system administrators and employees to ease remediation.
CrowdStrike has since created a Remediation & Guidance Hub where you can find the most up-to-date remediation information.
All eyes are on CrowdStrike over the next few weeks as they complete a root cause analysis and businesses recover and assess overall impact. CEO George Kurtz has been asked to testify in Congress, and it is likely that CrowdStrike will have to pay some fees and refunds. The company has been quick to accept responsibility for their role with senior leadership taking to LinkedIn to apologize.
CrowdStrike is widely considered to be the gold standard when it comes to Endpoint Detection & Response (EDR) products. While it is clear quality assurance policies need an overhaul, it is unlikely that customers will migrate away from the platform. A few updates CrowdStrike named in the Preliminary Post Incident report include:
On the tactical side, this is a reminder to businesses of the impact IT disruptions can have. It is important that businesses proactively and regularly assess their infrastructure. We recommend companies create cyber-resilience plans, including playbooks to address common scenarios to ensure business disruption is minimized in the event they occur. A few scenarios all businesses should have plans for include what to do if:
It is also important that businesses invest in tooling that automates IT workflows and enables teams to work more efficiently and effectively. Today’s basic enterprise security tech stack has multiple layers requiring different software solutions. For resource constrained IT teams, it's a mountain of responsibility with a steep learning curve and very little room for error.
Zip enables companies to manage all their security tools in one easy-to-use platform. We’ve built in automated workflows to simplify tasks while increasing security posture visibility. Our opinionated software and white-glove customer support ensures companies have comprehensive coverage. Because we’re a software company at heart, our customers pay a fraction of what they would for similar coverage from an MSP.