Cyberis 19 July, 2024

CrowdStrike / Windows Outage

What happened?

There are reports that an update to CrowdStrike Falcon Sensor, relating to a faulty channel file, on Windows machines caused some of these systems to crash with a BSOD and then enter a boot loop, preventing the systems from operating normally.  There is no evidence that this is the result of a cyber attack or hacking event.

CrowdStrike has issued a statement here: https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/ 

The support portal link (available for CrowdStrike customers only) is here: https://supportportal.crowdstrike.com/s/article/Tech-Alert-Windows-crashes-related-to-Falcon-Sensor-2024-07-19 

Wikipedia page about the incident and various impacts can be found here, which links to several articles and sources:

https://en.wikipedia.org/w/index.php?title=2024_CrowdStrike_incident 

What can be done about it?

Reports indicate that the root cause has been addressed and if systems are rebooted and able to receive the remediated content update they should recover. Unfortunately, where crashes mean impacted systems are unable to stay online to receive the new content update there is no easy fix to the problem.  It is not clear at the time of writing what proportion of impacted systems are unable to recover themselves via rebooting.

A workaround has been suggested by CrowdStrike in their statement:

Workaround Steps:
1. Boot Windows into Safe Mode or the Windows Recovery Environment
2. Navigate to the C:\Windows\System32\drivers\CrowdStrike directory
3. Locate the file matching “C-00000291*.sys”, and delete it.
4. Boot the host normally.

This workaround has been reported as effective by several sources; we have not independently verified it ourselves.

AWS

Amazon AWS has posted advice for users impacted here: https://repost.aws/en/knowledge-center/ec2-instance-crowdstrike-agent 

Microsoft Azure

Microsoft has posted advice for Azure users on their status page here: https://techcommunity.microsoft.com/t5/azure-compute-blog/recovery-options-for-azure-virtual-machines-vm-affected-by/ba-p/4196798 

Google Cloud

Google has posted advice for Google Cloud users on their incident page here: https://status.cloud.google.com/incidents/DK3LfKowzJPpZq4Q9YqP 

Recovery 

For businesses heavily impacted, recovery may take a significant time period - especially if many hosts need manual intervention via the workaround above to recover.  Where many remote users are impacted, end users may need to be talked individually through the workaround process above by IT engineers.  Where impacted equipment is deployed remotely, individual engineer visits to each impacts system may be required.

 

Improve your security

Our experienced team will identify and address your most critical information security concerns.