This isn’t a gloat post. In fact, I was completely oblivious to this massive outage until I tried to check my bank balance and it wouldn’t log in.

Apparently Visa Paywave, banks, some TV networks, EFTPOS, etc. have gone down. Flights have had to be cancelled as some airlines systems have also gone down. Gas stations and public transport systems inoperable. As well as numerous Windows systems and Microsoft services affected. (At least according to one of my local MSMs.)

Seems insane to me that one company’s messed up update could cause so much global disruption and so many systems gone down :/ This is exactly why centralisation of services and large corporations gobbling up smaller companies and becoming behemoth services is so dangerous.

  • aard@kyu.de
    link
    fedilink
    arrow-up
    175
    ·
    4 months ago

    The annoying aspect from somebody with decades of IT experience is - what should happen is that crowdstrike gets sued into oblivion, and people responsible for buying that shit should have an epihpany and properly look at how they are doing their infra.

    But will happen is that they’ll just buy a new crwodstrike product that promises to mitigate the fallout of them fucking up again.

  • shirro@aussie.zone
    link
    fedilink
    English
    arrow-up
    131
    ·
    edit-2
    4 months ago

    I isn’t even a Linux vs Windows thing but a competent at your job vs don’t know what the fuck you are doing thing. Critical systems are immutable and isolated or as close as reasonably possible. They don’t do live updates of third party software and certainly not software that is running privileged and can crash the operating system.

    I couldn’t face working in corporate IT with this sort of bullshit going on.

    • rozodru@lemmy.world
      link
      fedilink
      arrow-up
      57
      ·
      4 months ago

      This is just like “what not to do in IT/dev/tech 101” right here. Every since I’ve been in the industry for literally decades at this point I was always told, even when in school, “Never test in production, never roll anything out to production on a Friday, if you’re unsure have someone senior code review” of which, Crowdstrike, failed to do all of the above. Even the most junior of junior devs should know better. So the fact that this update was allowed go through…I mean blame the juniors, the seniors, the PM’s, the CTO’s, everyone. If your shit is so critical that a couple bad lines of poorly written code (which apparently is what it was) can cripple the majority of the world…yeah crowdstrike is done.

      • magic_lobster_party@kbin.run
        link
        fedilink
        arrow-up
        33
        ·
        4 months ago

        It’s incredible how an issue of this magnitude didn’t get discovered before they shipped it. It’s not exactly an issue that happens in some niche cases. It’s happening on all Windows computers!

        This can only happen if they didn’t test their product at all before releasing to production. Or worse: maybe they did test, got the error, and they just “eh, it’s probably just something wrong with test systems”, and then shipped anyway.

        This is just stupid.

    • CalcProgrammer1@lemmy.ml
      link
      fedilink
      arrow-up
      29
      ·
      edit-2
      4 months ago

      It’s also a “don’t allow third party proprietary shit into your kernel” issue. If the driver was open source it would actually go through a public code review and the issue would be more likely to get caught. Even if it did slip through people would publically have a fix by now with all the eyes on the code. It also wouldn’t get pushed to everyone simultaneously under the control of a single company, it would get tested and packaged by distributions before making it to end users.

      • Aphelion@lemm.ee
        link
        fedilink
        arrow-up
        6
        ·
        4 months ago

        It’s actually a “test things first and have a proper change control process” thing. Doesn’t matter if it’s open source, closed source scummy bullshit or even coded by God: you always test it first before hitting deploy.

        • cybersandwich@lemmy.world
          link
          fedilink
          arrow-up
          12
          ·
          4 months ago

          And roll it out in a controlled fashion: 1% of machines, 10%, 25%…no issues? Do the rest.

          How this didn’t get caught by testing seems impossible to me.

          The implementation/rollout strategy just seems bonkers. I feel bad for all of the field support guys who have had there next few weeks ruined, the sys admins who won’t sleep for 3 days, and all of the innocent businesses that got roped into it.

          A couple local shops are fucked this morning. Kinda shocked they’d be running crowd strike but also these aren’t big businesses. They are probably using managed service providers who are now swamped and who know when they’ll get back online.

          One was a bakery. They couldn’t sell all the bread they made this morning.

          • No1@aussie.zone
            link
            fedilink
            arrow-up
            3
            ·
            edit-2
            4 months ago

            One shop I was at had a manual process going with cash only purchases.

            That blew up when I ordered 3 things and the ‘cashier’ didn’t know how to add them together. They didn’t have calculator on Windows available🤣

            I told them the total and change to give me, but lent them the calculator on my phone so they could verify for themselves 🤣

      • Morphit @feddit.uk
        link
        fedilink
        arrow-up
        2
        ·
        4 months ago

        It’s not that clear cut a problem. There seems to be two elements; the kernel driver had a memory safety bug; and a definitions file was deployed incorrectly, triggering the bug. The kernel driver definitely deserves a lot of scrutiny and static analysis should have told them this bug existed. The live updates are a bit different since this is a real-time response system. If malware starts actively exploiting a software vulnerability, they can’t wait for distribution maintainers to package their mitigation - they have to be deployed ASAP. They certainly should roll-out definitions progressively and monitor for anything anomalous but it has to be quick or the malware could beat them to it.

        This is more a code safety issue than CI/CD strategy. The bug was in the driver all along, but it had never been triggered before so it passed the tests and got rolled out to everyone. Critical code like this ought to be written in memory safe languages like Rust.

    • umbrella@lemmy.ml
      link
      fedilink
      arrow-up
      14
      ·
      4 months ago

      I couldn’t face working in corporate IT with this sort of bullshit going on.

      im taking you don’t work in IT anymore then?

    • Aceticon@lemmy.world
      link
      fedilink
      arrow-up
      13
      ·
      edit-2
      4 months ago

      More generally: delegate anything critical to a 3rd party and you’ve just put your business at the mercy of the quality (or lack thereof) of their own business processes which you do not control, which is especially dangerous in the current era of “cheapest as possible” hiring practices.

      Having been in IT for almost 3 decades, a lesson I have learned long ago and which I’ve also been applying to my own things (such as having my own domain for my own e-mail address rather than using something like Google) was that you should avoid as much as possible to have your mission critical or hard to replace stuff dependent on a 3rd Party, especially if the dependency is Live (i.e. activelly connected rather than just buying and installing their software).

      I’ve managed to avoid quite a lot of the recent enshittification exactly because I’ve been playing it safe in this domain for 2 decades.

      • SayCyberOnceMore@feddit.uk
        link
        fedilink
        English
        arrow-up
        24
        ·
        4 months ago

        No it’s Crowdstrike… we’re just seeing an issue with their Windows software, not their Linux software.

        • Sethayy@sh.itjust.works
          link
          fedilink
          arrow-up
          3
          ·
          4 months ago

          That being said Microsoft still did hire crowd strike and give them the keys to release an update like this.

          End result still is windows having more issues than linux

          • SquigglyEmpire@lemmy.world
            link
            fedilink
            arrow-up
            6
            ·
            4 months ago

            Huh? Crowdstrike is an antivirus product, you’re only affected if you bought and installed it on your Windows devices. Crowdstrike also had issues with their Linux version a few weeks ago, but that one was thankfully less severe.

  • monoboy@lemmy.zip
    link
    fedilink
    arrow-up
    79
    ·
    edit-2
    4 months ago

    Didn’t Crowdstrike have a bad update to Debian systems back in April this year that caused a lot of problems? I don’t think it was a big thing since not as many companies are using Crowdstrike on Debian.

    Sounds like the issue here is Crowdstrike and not Windows.

    • Baldur Nil@programming.dev
      link
      fedilink
      arrow-up
      43
      ·
      edit-2
      4 months ago

      They didn’t even bother to do a gradual rollout, like even small apps do.

      The level of company-wide incompetence is astounding, but considering how organizations work and disregard technical people’s concerns, I’m never surprised when these things happen. It’s a social problem more than a technical one.

      • PlexSheep@infosec.pub
        link
        fedilink
        arrow-up
        18
        ·
        edit-2
        4 months ago

        They didn’t even bother to test their stuff, must have pushed to prod

        (Technically, test in prod)

        • laurelraven
          link
          fedilink
          arrow-up
          13
          ·
          4 months ago

          Everyone has a test environment

          Some are lucky enough to also have a separate production environment

  • Swarfega@lemm.ee
    link
    fedilink
    English
    arrow-up
    61
    ·
    4 months ago

    I’ve just spent the past 6 hours booting into safe mode and deleting crowd strike files on servers.

    • allywilson@lemmy.ml
      link
      fedilink
      arrow-up
      18
      ·
      4 months ago

      Feel you there. 4 hours here. All of them cloud instances whereby getting acces to the actual console isn’t as easy as it should be, and trying to hit F8 to get the menu to get into safe mode can take a very long time.

      • Swarfega@lemm.ee
        link
        fedilink
        English
        arrow-up
        6
        ·
        4 months ago

        Ha! Yes. Same issue. Clicking Reset in vSphere and then quickly switching tabs to hold down F8 has been a ball ache to say the least!

        • Avatar_of_Self@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          4 months ago

          What I usually do is set next boot to BIOS so I have time to get into the console and do whatever.

          Also instead of using a browser, I prefer to connect vmware Workstation to vCenter so all the consoles insta open in their own tabs in the workspace.

        • Blank@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          4 months ago

          Just go into settings and add a boot delay, then set it back when you’re done.

      • ArrogantAnalyst@infosec.pub
        link
        fedilink
        arrow-up
        10
        ·
        4 months ago

        Since it has to happen in windows safe mode it seems to be very hard to automate the process. I haven’t seen a solution yet.

      • Swarfega@lemm.ee
        link
        fedilink
        English
        arrow-up
        5
        ·
        4 months ago

        Sadly not. Windows doesn’t boot. You can boot it into safe mode with networking, at which point maybe with anaible we could login to delete the file but since it’s still manual work to get windows into safe mode there’s not much point

        • lengau@midwest.social
          link
          fedilink
          arrow-up
          7
          ·
          4 months ago

          It is theoretically automatable, but on bare metal it requires having hardware that’s not normally just sitting in every data centre, so it would still require someone to go and plug something into each machine.

          On VMs it’s more feasible, but on those VMs most people are probably just mounting the disk images and deleting the bad file to begin with.

          • Swarfega@lemm.ee
            link
            fedilink
            English
            arrow-up
            4
            ·
            4 months ago

            I guess it depends on numbers too. We had 200 to work on. If you’re talking hundreds more than looking at automation would be a better solution. In our scenario it was just easier to throw engineers at it. I honestly thought at first this was my weekend gone but we got through them easily in the end.

  • areyouevenreal@lemm.ee
    link
    fedilink
    arrow-up
    60
    ·
    edit-2
    4 months ago

    Crowdstrike already killed some Linux machines. Let’s not pretend Windows is at fault here or Linux is magically better in this area. No one is immune from software that can run as a kernel module going bad.

    • electricprism@lemmy.ml
      link
      fedilink
      arrow-up
      10
      ·
      edit-2
      4 months ago

      Every system has its faults. And I’m still going to dogpile the system with the most faults. But hell Microsoft did buy GitHub, Halo, MineCraft, and a million other things they will probably find a way to buy Linux and ruin it for us just like they ruin everything else.

      Let’s see, …we are somewhere in between Extend and Extinguish on the roadmap.

      Edit: Case & Point, RIP RedHat & IBM and GitHub CoPilot, what a great idea. RIP Atom Editor and probably a million other things. Do we have a KilledByMicrosoft website yet? I hope people in the pharmacy could get their prescriptions or we might have to add peoples names to the list.

      • areyouevenreal@lemm.ee
        link
        fedilink
        arrow-up
        6
        ·
        4 months ago

        None of this has to do with the current outage though.

        I hope people in the pharmacy could get their prescriptions or we might have to add peoples names to the list.

        Which isn’t Microsoft’s fault. Linux systems have also been taken down by Crowdstrike’s fuck ups in the recent past.

        • electricprism@lemmy.ml
          link
          fedilink
          arrow-up
          5
          ·
          4 months ago

          Microsoft has many faults and I’ll criticize them as I please. And if Linux is a culprit in a global outage someday I’ll contemplate criticizing them too.

          This “Not Microsoft’s Fault” comes off as white knighting for Muh Billion Dolla Corporation.

          Do we really need to SIMP for the company town.

          Microsoft, Google, Apple, Amazon and others deserve every ounce of vitrol they earn through their shitty practices. Again I am criticizing them for being shitty not for the particulars of System X vs System Z but for the aftermath.

          • Wereduck
            link
            fedilink
            arrow-up
            8
            ·
            4 months ago

            I get where you are coming from, but this event is pretty much entirely the fault of Crowdstrike and the countless organizations that trusted them. It’s definitely a show of how massive outages are more likely when things are overly centralized and proprietary, and managed by big, shitty, profit driven organizations. Since crowdstrike operates in kernel space, it doesn’t matter which operating system it’s on, it can break it if it does something stupid. In fact they managed to break some redhat machines not too long ago, and some Debian machines not long before that. It’s just the impact wasn’t as far reaching as this recent utter fuckup, just because fewer critical machines were affected, so we didn’t hear about those smaller fuckups in the news.

            • electricprism@lemmy.ml
              link
              fedilink
              arrow-up
              1
              ·
              4 months ago

              Yes, thank you, exactly. The centralized model has its benefits but it also can act as a single point of failure.

              If I was going to analyze from an engineering perspective I would focus on when these inevitable events occur due to human error do we have adequate tools to roll back updates? Do we snapshot OS drives before updates? Is there adequate Safe Mode or Fallback Tools to diagnose which files are offending in order to allow the user to remove them.

              In my view the windows user isn’t dignified to have the skills or intelligence needed to workaround a “setback” issue like the one yesterday.

              It doesn’t help that NTFS is missing modern capabilities, or that there isn’t easy to use DIFF for the layman to understand which files were added to the filesystem that may be causing the breakage.

              To be fair though even with those pot holes filled the entire design paradigm of Windows and a proprietary platform is part of the problem. Software is not broken up into package modules that can be assembled into a functioning system it is encumbered with “anti-piracy” boogie man where the software treats the user as an enemy and is designed to break.

              Linux isn’t like that. I’ve cloned many distro drives and swapped them into new machines and with 1 or 2 tweaks they JustWork

              I see many people on the net defending Microsoft as blameless for technical reasons.

              My criticisms were that Microsoft just sucks as you interpreted correctly and offered a eloquent summary. Thank You.

              Where I think the entire conversation should move is –

              What are the design flaws that allowed this to happen?

              “More Rust & Less C” I see some people suggest as this was allegedly a null pointer issue.

              And is Windows Broken By Design? My opinion answer - Yes.

              (Okay, and what to do about it before the next billion dollars is lost. I would think critical infrastructure should have a model similar to NixOS in immutability but that’s just my opinion.)

              • areyouevenreal@lemm.ee
                link
                fedilink
                arrow-up
                2
                ·
                edit-2
                4 months ago

                Windows does have a fallback mode called safe mode and that’s exactly what’s being used to fix this utter mess.

                Package management isn’t going to save you from this as it didn’t save the Linux systems affected last time. It didn’t stop Arch Linux from failing to boot after a Grub update either.

                Windows also has drive cloning tools, that isn’t unique to Linux.

                NixOS isn’t immutable. It’s not an a/b root system and / isn’t read only. Rather it’s what’s known as reproducible. I am not convinced NixOS would make this any easier either given how simple the fix was. Funnily enough though tools exist called ansible and puppet for configuring systems in repeatable ways that apply to both other Linux systems, Windows systems, and even macOS.

                There are like one or two valid points in this whole comment and the rest is pretty much falsehoods and misconceptions.

                Edit: Forgot to mention tools exist to make Windows immutable as well. So that is an option.

          • Catsrules@lemmy.ml
            link
            fedilink
            arrow-up
            4
            ·
            4 months ago

            Sure you can criticize as much as you want but if you are wrong in your criticism it just damages all of your criticism over all.

            In my opinion it is important to state facts not fiction. This was not Microsoft’s fault, no matter how much you hate Microsoft it still wasn’t there fault and saying that is was is incorrect and doesn’t solve the issue.

          • areyouevenreal@lemm.ee
            link
            fedilink
            arrow-up
            2
            ·
            edit-2
            4 months ago

            Except they haven’t done anything shitty this time. What you are doing would be a bit like claiming the Nazis are responsible for micro plastics. Like yeah Nazis are shit but making false allegations is just giving their defenders something to throw in your face. It makes you, and everyone who is critical of Microsoft look dumb. How about you criticize the company that actually screwed up? They are also a multi-billion dollar company, yet you aren’t blaming them for something that is clearly their fault.

      • areyouevenreal@lemm.ee
        link
        fedilink
        arrow-up
        3
        ·
        4 months ago

        Also fyi Red Hat and IBM are still around and aren’t really a force for good anyway. Stop SIMPing for large companies.

        • LeFantome@programming.dev
          link
          fedilink
          arrow-up
          1
          ·
          4 months ago

          Hilarious. I am sure that, out of principle, you have stopped using all the software that Red Hat contributes to your distribution.

          If it is ok with you, I am not going to define my morality in terms of corporate interest. They are not my friends but I do not believe that shutting on their contributions does much for me either.

          • areyouevenreal@lemm.ee
            link
            fedilink
            arrow-up
            2
            ·
            4 months ago

            I am not shitting on their contributions. All I am saying is that as a large company they aren’t anymore my friend than Microsoft. Generally they still exist and make contributions. Microsoft didn’t kill them like the person I am replying to is insinuating.

  • nickiam2@aussie.zone
    link
    fedilink
    arrow-up
    41
    ·
    edit-2
    4 months ago

    I work in hospitality and our systems are completely down. No POS, no card processing, no reservations, we’re completely f’ked.

    Our only saving grace is the fact that we are in a remote location and we have power outages frequently. So operating without a POS is semi-normal for us.

  • SitD@lemy.lol
    link
    fedilink
    arrow-up
    35
    ·
    edit-2
    4 months ago

    I love how everyone understands the issue wrong. It’s not about being on Windows or Linux. It’s about the ecosystem that is common place and people are used to on Windows or Linux. On windows it’s accepted that every stupid anticheat can drop its filthy paws into ring 0 and normies don’t mind. Linux has a fostered a less clueless community, but ultimately it’s a reminder to keep vigilant and strive for pure and well documented open source with the correct permissions.

    BSODs won’t come from userspace software

    • Nonagon ∞ Orc@lemmy.world
      link
      fedilink
      arrow-up
      18
      ·
      4 months ago

      While that is true, it makes sense for antivirus/edr software to run in kernelspace. This is a fuck-up of a giant company that sells very expensive software. I wholeheartedly agree with your sentiment, but I mostly see this as a cautionary tale against putting excessive trust and power in the hands of one organization/company.

      Imagine if this was actually malicious instead of the product of incompetence, and the update instead ran ransomware.

      • nexussapphire@lemm.ee
        link
        fedilink
        English
        arrow-up
        3
        ·
        4 months ago

        If it was malicious it wouldn’t have had the reach a trusted platform would. That is what made the xz exploit so scary was the reach and the malicious attempt.

        I like open source software but that’s one big benefit of proprietary software. Not all proprietary software is bad. We should recognize the ones doing their best to avoid anti consumer practices and genuinely try to serve their customers needs to the best of their abilities.

      • SitD@lemy.lol
        link
        fedilink
        arrow-up
        3
        ·
        edit-2
        4 months ago

        That’s precisely why I didn’t blame windows in my post, but the windows-consumer mentality of “yeah install with privileges, shove genshin impact into ring 0 why not”

        Linux can have the same issue. We have to keep the culture on our side here vigilant and pure near the kernel.

      • Skankhunt42@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        4 months ago

        I deployed it for my last employer on our linux environment. My buddies who still work there said Linux was fine while they had to help the windows Admins fix their hosts.

  • axzxc1236@lemm.ee
    link
    fedilink
    arrow-up
    34
    ·
    edit-2
    4 months ago

    I am born too late to understand what Y2K problem was, this (the result) might be what people thought could happen.

    • HumanPenguin@feddit.uk
      link
      fedilink
      English
      arrow-up
      38
      ·
      edit-2
      4 months ago

      Yep pretty much but on a larger scale.

      1st please do not believe the bull that there was no problem. Many folks like me were paid to fix it before it was an issue. So other than a few companies, few saw the result, not because it did not exist. But because we were warned. People make jokes about the over panic. But if that had not happened, it would hav been years to fix, not days. Because without the panic, most corporations would have ignored it. Honestly, the panic scared shareholders. So boards of directors had to get experts to confirm the systems were compliant. And so much dependent crap was found running it was insane.

      But the exaggerations of planes falling out of the sky etc. Was also bull. Most systems would have failed but BSOD would be rare, but code would crash and some works with errors shutting it down cleanly, some undiscovered until a short while later. As accounting or other errors showed up.

      As other have said. The issue was that since the 1960s, computers were set up to treat years as 2 digits. So had no expectation to handle 2000 other than assume it was 1900. While from the early 90s most systems were built with ways to adapt to it. Not all were, as many were only developing top layer stuff. And many libraries etc had not been checked for this issue. Huge amounts of the infra of the world’s IT ran on legacy systems. Especially in the financial sector where I worked at the time.

      The internet was a fairly new thing. So often stuff had been running for decades with no one needing to change it. Or having any real knowledge of how it was coded. So folks like me were forced to hunt through code or often replace systems that were badly documented or more often not at all.

      A lot of modern software development practices grew out of discovering what a fucking mess can grow if people accept an “if it ain’t broke, don’t touch it” mentality.

      • sep@lemmy.world
        link
        fedilink
        arrow-up
        11
        ·
        4 months ago

        Was there patching systems and testing they survived the rollover months before it happened.
        One software managed the rollover. But failed the year after. They had quickly coded in an explicit exception for 00. But then promptly forgot to fix it properly!.

    • cannedtuna@lemmy.world
      link
      fedilink
      arrow-up
      11
      ·
      4 months ago

      Kinda I guess. It was about clocks rolling over from 1999 to 2000 and causing a buffer overflow that would supposedly crash all systems everywhere causing the country to come to a hault.

      • Hildegarde@lemmy.world
        link
        fedilink
        arrow-up
        22
        ·
        4 months ago

        Most old systems used two digits for years. The year would go from 99 to 0. Any software doing a date comparison will get a garbage result. If a task needs to be run every 5 minutes, what will the software do if that task was last run 99 years from now? It will not work properly.

        Governments and businesses spent lots of money and time patching critical systems to handle the date change. The media made a circus out of it, but when the year rolled over, everything was fine.

        • Aceticon@lemmy.world
          link
          fedilink
          arrow-up
          13
          ·
          4 months ago

          Also a lot of people were “on call” to handle any problems when the year changed, so the few problem that had passed unnoticed when doing the fixed and did pop up when the year changed, got solved a lot faster than they normally would.

        • psud@aussie.zone
          link
          fedilink
          arrow-up
          5
          ·
          4 months ago

          One program I tested went from (31,12,99) to (01,01,100). Its front end formatted the date and added the century, so it showed 1 January 2000 as 01/01/19100

          That wasn’t fixed. The fault didn’t affect processing (the years were wrong but had the correct offset between them) and was only visible to internal users, and also that system was expected to be retired in 2004

        • cannedtuna@lemmy.world
          link
          fedilink
          arrow-up
          4
          ·
          4 months ago

          We also got the worst version of Windows ever, ME. Tho maybe with all the BS they’ve done with 11 that might change.

          • zod000@lemmy.ml
            link
            fedilink
            arrow-up
            8
            ·
            4 months ago

            I’m not sure I’d stick to calling it the worst version “ever” since MS is trying really hard to out do themselves.

          • ikidd@lemmy.world
            link
            fedilink
            English
            arrow-up
            7
            ·
            4 months ago

            I’d use ME before the adware that is the current version. It wasn’t that bad, it was just Win98 with some visual slop on top that crashed slightly more often.

  • bricklove@midwest.social
    link
    fedilink
    English
    arrow-up
    17
    ·
    edit-2
    4 months ago

    I wanted to share the article with friends and copy a part of the text I wanted to draw attention to but the asshole site has selection disabled. Now I will not do that and timesnownews can go fuck themselves

    • ArrogantAnalyst@infosec.pub
      link
      fedilink
      arrow-up
      12
      ·
      edit-2
      4 months ago

      It is annoying. Some possible solutions:

      On desktop: Using Shift + ALT you often can overrule this and select text anyway.

      On mobile: Using the reader mode or the Print preview often works. It does for me on this website.

    • cryoistalline@lemmy.ml
      link
      fedilink
      arrow-up
      11
      ·
      4 months ago

      heres the entire article

      Latest Crowdstrike Update Issue: Many Windows users are experiencing Blue Screen of Death (BSOD) errors due to a recent CrowdStrike update. The issue affects various sensor versions, and CrowdStrike has acknowledged the problem and is investigating the cause, as stated in a pinned message on the company’s forum.
      Who Have Been Affected
      Australian banks, airlines, and TV broadcasters first reported the issue, which quickly spread to Europe as businesses began their workday. UK broadcaster Sky News couldn’t air its morning news bulletins, while Ryanair experienced IT issues affecting flight departures. In the US, the Federal Aviation Administration grounded all Delta, United, and American Airlines flights due to communication problems, and Berlin airport warned of travel delays from technical issues.
      In India too, numerous IT organisations were reporting in issues with company-wide. Akasa Airlines and Spicejet experienced technical issues affecting online services. Akasa Airlines’ booking and check-in systems were down at Mumbai and Delhi airports due to service provider infrastructure issues, prompting manual check-in and boarding. Passengers were advised to arrive early, and the airline assured swift resolution. Spicejet also faced problems updating flight disruptions, actively working to fix the issue. Both airlines apologized for the inconvenience caused and promised updates as soon as the problems were resolved.
      Crowdstrike’s Response
      CrowdStrike acknowledged the problem, linked to their Falcon sensor, and reverted the faulty update. However, affected machines still require manual intervention. IT admins are resorting to booting into safe mode and deleting specific system files, a cumbersome process for cloud-based servers and remote laptops. Reports from IT professionals on Reddit highlight the severity, with entire companies offline and many devices stuck in boot loops. The outage underscores the vulnerability of interconnected systems and the critical need for robust cybersecurity solutions. IT teams worldwide face a long and challenging day to resolve the issues and restore normal operations.
      What to Expect:

      -A Technical Alert (TA) detailing the problem and potential workarounds is expected to be published shortly by CrowdStrike.
      -The forum thread will remain pinned to provide users with easy access to updates and information.

      What Users Should Do:

      -Hold off on troubleshooting: Avoid attempting to fix the issue yourself until the official Technical Alert is released.
      -Monitor the pinned thread: This thread will be updated with the latest information, including the TA and any temporary solutions.
      -Be patient: Resolving software conflicts can take time. CrowdStrike is working on a solution, and updates will be posted as soon as they become available.

      In an automated reply from Crowdstrike, the company had stated: CrowdStrike is aware of reports of crashes on Windows hosts related to the Falcon Sensor. Symptoms include hosts experiencing a blue screen error related to the Falcon Sensor. The course of current action will be - our Engineering teams are actively working to resolve this issue and there is no need to open a support ticket. Status updates will be posted as we have more information to share, including when the issue is resolved.
      For Users Experiencing BSODs:
      If you’re encountering BSOD errors after a recent CrowdStrike update, you’re not alone. This appears to be a widespread issue. The upcoming Technical Alert will likely provide specific details on affected CrowdStrike sensor versions and potential workarounds while a permanent fix is developed.
      If you have urgent questions or concerns, consider contacting CrowdStrike support directly.

      • stringere@sh.itjust.works
        link
        fedilink
        arrow-up
        6
        ·
        4 months ago

        If you have urgent questions or concerns, consider contacting CrowdStrike support directly.

        Something tells me that isn’t going to provide the comfort it was meant to.

    • Bitrot@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      10
      ·
      4 months ago

      In the US 911 is decentralized, so widespread things will always affect it in some places. Solarwinds hack was another one.

      Assuming the entire phone system isn’t down, there are typically very shitty to deal with workarounds for CAD outages.

    • Fonzie!@ttrpg.network
      link
      fedilink
      arrow-up
      7
      ·
      4 months ago

      That’s potentially life threatening. I wonder if 112 in other countries is affected, it shouldn’t be but at this point I’m afraid it is.