CrowdStrike’s faulty update crashed 8.5 million Windows devices, says Microsoft

Date:

Share:

[ad_1]

CrowdStrike’s faulty update caused a worldwide tech disaster that affected 8.5 million Windows devices on Friday, according to Microsoft. Microsoft says that’s “less than one percent of all Windows machines,” but it was enough to create problems for retailers, banks, airlines, and many other industries, as well as everyone who relies on them.

CrowdStrike’s breakdown explains the configuration file that was at the heart of the issue:

The configuration files mentioned above are referred to as “Channel Files” and are part of the behavioral protection mechanisms used by the Falcon sensor. Updates to Channel Files are a normal part of the sensor’s operation and occur several times a day in response to novel tactics, techniques, and procedures discovered by CrowdStrike. This is not a new process; the architecture has been in place since Falcon’s inception.

CrowdStrike explained that the file is not a kernel driver but is responsible for “how Falcon evaluates named pipe1 execution on Windows systems.” Security researcher and Objective See founder Patrick Wardle says that the explanation aligns with the earlier analysis he and others provided about the cause of the crash, as the problem file “C-00000291- “triggered a logic error that resulted in an OS crash” (via CSAgent.sys).”

Other excerpts from CrowdStrike’s blog explain more about what went wrong:

On July 19, 2024 at 04:09 UTC, as part of ongoing operations, CrowdStrike released a sensor configuration update to Windows systems. Sensor configuration updates are an ongoing part of the protection mechanisms of the Falcon platform. This configuration update triggered a logic error resulting in a system crash and blue screen (BSOD) on impacted systems.

And which systems were affected and when:

Systems running Falcon sensor for Windows 7.11 and above that downloaded the updated configuration from 04:09 UTC to 05:27 UTC – were susceptible to a system crash.

CrowdStrike’s channel file updates were pushed to computers regardless of any settings meant to prevent such automatic updates, Wardle noted.

[ad_2]

Source link

Subscribe to our magazine

━ more like this

Crypto Crime Investigation (C.C.I) Enhances Singapore’s Safety with Innovative Pig Butchering Fraud Recovery Technology

Crypto Crime Investigation (C.C.I) is proud to announce the launch of its groundbreaking Pig Butchering fraud recovery technology, a vital initiative aimed at protecting...

U.S. Treasury removes Francisco Javier D’Agostino from sanctions list after independent review

The United States Treasury Department has removed Francisco Javier D'Agostino from its sanctions list following an independent review that confirmed his business activities were...

Expert Forensic Analysis in Investigating Crypto Investment Scams and Recovering Lost Funds

The allure of cryptocurrency investment, with its potential for high returns, has unfortunately attracted a darker side: sophisticated and deceptive scams. Victims of these...

Asia’s Certified Cryptocurrency Investigator Launches in Singapore: Pioneering Crypto Crime Investigation (C.C.I)

Singapore, – In a groundbreaking move to enhance digital asset security and bolster consumer confidence in the cryptocurrency market, the Crypto Crime  Investigation...

C.C.I Launches as the Ultimate Recovery Platform for Crypto Investors Targeted by Scams

Nevada, Florida – In response to the growing concern over cryptocurrency investment scams, C.C.I (Crypto Crime Investigation) proudly announces its official launch as the...