General

A Deep Dive Into Microsoft’s CrowdStrike Global IT Outage

24 July 2024

On July 18th 2024, the digital world descended into chaos as Microsoft experienced a global IT outage. 

As one of the largest IT outages in history, thousands of businesses and institutions around the world were knocked offline. From airports to healthcare institutes to offices and railways, the Microsoft outage has led to widespread disruptions and delays across the world. 

Cyber-security firm CrowdStrike has admitted that the issue was caused by an update to its software. However, the impact of this seemingly small error has resulted in much frustration and massive headaches for IT departments on a global scale. 

In this article, we will be covering the Microsoft outage, what caused it and how it has affected the daily lives of thousands of people. 

Let’s begin!

Breaking Down the Microsoft Global IT Outage

On Thursday, Microsoft experienced a global outage due to an issue with CrowdStrike’s Falcon Sensor software, triggering the ‘Blue Screen of Death’ on many Windows PCs. 

The Microsoft Global IT outage is a major IT issue that caused massive disruption to transport, businesses, healthcare and various other sectors around the world. This dilemma has resulted in several flights being grounded or cancelled, with endless queues and delays at many airports. 

Many cybersecurity experts have taken to calling the CrowdStrike outage the ‘largest IT outage in history’ and compared it to the Y2K bug but with a much heavier and more damaging impact. 

The Blue Screen of Death

Many PC users are aware of the various error messages that can result in panic and frustration. However, those of us who have come face-to-face with the Windows Blue Screen of Death (BSoD), understand the concern of users seeing it appear worldwide. 

The Blue Screen of Death (BSoD) is an error message screen on Windows PCs that halts all operations to display an error message. This error occurs when your system encounters a major issue, leading to unexpected restarts and even potential data loss. 

More often than not, a BSoD is prompted by hardware or software issues, however, it is not the easiest thing to resolve. While CrowdStrike claims to have identified and fixed the disastrous update, many devices remain non-operational. 

What Caused the IT Outage?

The question on everyone’s mind is, what caused this disastrous tech catastrophe?

According to the president of CrowdStrike, George Kurtz, the global IT outage was caused by a “defect found in a single content update for Windows hosts”. He goes on to confirm that this is neither a security incident nor a cyberattack and reassures the public that the issue has been identified, isolated and a fix has been deployed. 

While it may appear extreme that a piece of cybersecurity software was able to cause such widespread damage, it is important to remember that these products are deeply integrated into the inner workings of computer networks. This allows them complete access to all the inner workings of an IT system so they can operate it effectively and keep guard against any malicious attacks. 

What Is CrowdStrike?

CrowdStrike is a US cybersecurity firm based in Austin, Texas and its Falcon Sensor software is designed to protect IT systems from cyber-attacks

Similarly to many modern technology companies, CrowdStrike has not been around for very long. Founded a mere 13 years ago, it has grown to employ almost 8,500 people. 

However, in an almost ironic series of events, this time a firm that is normally part of the solution to IT problems, is instead the point of origin. 

The CrowdStrike outage serves as a reminder of the fragility of our modern digital infrastructure, demonstrating how a company that is not exactly a household name can be at the heart of a global tech crisis. This reinforces the importance of having data backups and several lines of defence to mitigate the impact for your business. 

Who Has Been Affected?

The Microsoft global IT outage had a widespread impact and affected various platforms such as Microsoft 365, Amazon Web Services, Azure and even social media platforms like Instagram and eBay. 

On a worldwide scale, airports and air travel were particularly badly hit with at least 1,400 flights being cancelled and several other flights being delayed. Similarly, many railway companies across the UK have reported delays and widespread IT issues.

Payment systems were also impacted forcing many shops to conduct cash-only transactions. London cabbies were left struggling to take card payments while supermarkets including Waitrose and Morrisons were unable to accept contactless payments. 

Healthcare was another sector that was badly affected with many GP practices facing trouble booking appointments, accessing patient records and viewing test results. Even broadcasters, including Sky News, were caught up in the technical chaos and spent several hours off air. 

As a result of the global IT outage, CrowdStrike’s shares are reportedly down by more than 20% in pre-marketing trading, equalling a loss of over £12.3bn in value. 

Many cybersecurity experts believe that although a software fix is now available, it will take a huge amount of work to get all computer devices up and running again. 

Despite the serious nature of this international predicament, users took to social media to joke about the early weekend arrival. With the hashtag #MicrosoftOutage trending, many shared memes and humorous takes on the situation. One user joked, “Looks like the weekend started early thanks to Microsoft!”

Contact Redpalm For Comprehensive IT Security Services! 

While the Microsoft global IT outage may have occurred due to an error on the part of a cybersecurity firm, cybersecurity services are still a necessity if you wish to protect your networks from cyber-attacks and data breaches. 

Redpalm is an MSP that provides professional IT support paired with the latest cybersecurity solutions to safeguard your IT systems. With years of knowledge and expertise, our team of IT experts are well-equipped to identify and mitigate any risks on an immediate basis. 

We also offer services like vulnerability assessments, technology procurement, incident response, IT audits and health checks and so much more!

To learn more about our services, click here or contact us to schedule an appointment today!

Latest From The Blogs

prevent a data breach, computer devices with code and access denied displayed on screen
Cyber Security

5 Effective Strategies to Prevent a Data Breach

Data breaches occur when any sensitive information is leaked or exposed to the public without authorisation. They can lead to the loss of your organisation’s intellectual property, customer data, or other confidential information.

Read More
cybersecurity metrics, woman next to data projection
Cyber Security

7 Cyber Security Metrics Every Business Should Track

The ever-evolving nature of cyber threats means tracking cyber security metrics is essential for evaluating your company’s cyber security posture and maintaining cyber defences.

Read More
digital privacy, person typing in their login credentials
General

Understanding the Future of Digital Privacy

Technological advancements have reshaped how personal information is collected, shared, and used, and privacy has emerged as one of the biggest challenges in this digital age.

Read More
cyber security certification UK, two males working on a computer in server room
Cyber Security

5 Tips to Secure Your Cyber Essentials Certification in the UK

According to the 2024 Cyber Security Breaches Survey conducted by the UK government, 50% of UK businesses experienced a cyber attack or security breach in 2023.  With a growing frequency of cyber attacks, many businesses have begun to prioritise cyber security and cyber security certification in the UK.

Read More
cyber security strategy, woman and man working on computers
Cyber Security

How to Build a Strong Cyber Security Strategy

According to cyber security stats, cyber attacks have become more prevalent in recent years, not only increasing in number of incidents but also in their level of sophistication. This increase in ransomware, phishing, and other types of cyber attacks has only emphasised the need and importance of a cyber security strategy for businesses across industries.  An effective cyber security strategy helps you protect your digital assets, such as your systems, networks, and data, from unauthorised access and damage. A well-constructed strategy involves procedures, policies and frameworks to help reduce risks, respond to incidents and safeguard sensitive data.  Your cyber security strategy isn’t meant to be perfect; it’s intended to act as a strongly educated guess as to what you need to do to keep your business safe. As your organisation and the world around you evolve, your strategy needs to evolve as well.

Read More
cyber criminal tactics, two individuals hacking into a computer system
Cyber Security

7 Common Cyber Criminal Tactics to Watch Out For

Cyber crimes are attempts by cyber criminals, hackers or other malicious individuals to gain unauthorised access to a computer network or system. These attacks often target a range of victims, from individual users to organisations and even governments, which begs the question, can cyber crime be curbed?

Read More
improve online security, a person using a laptop with visual of security overlaid on top of image
Cyber Security

6 Simple Ways to Boost Your Company’s Online Security

Online security, aka cyber security, involves protecting your business’s sensitive information and critical systems from unauthorised access and theft. With data networks being almost universal, fraudsters are becoming more and more innovative with their scams. Every day, countless cyber criminals scan unsecured or poorly secured networks, looking for an opportune moment to attack.

Read More
phishing email scam, paper email icon on a hook above a laptop
Cyber Security

A Deep Dive Into HR Phishing Email Scams

Have you ever received an email from your HR team that appeared too good to be true? Or perhaps there was something about it that sounded a little off. Beware—you may have narrowly avoided falling into the clutches of an HR phishing email scam.

Read More
technology as a service, engineer in data center
General

The Benefits of Technology as a Service (TaaS) 

Traditionally, IT infrastructure necessitated a server installed on your business premises to allow access to hardware and software applications. If you wanted to scale your data storage and services, you had to purchase additional hardware or invest in expensive upgrades.

Read More
edge computing, woman inspecting servers
General, Hybrid IT, Managed IT Services

Everything You Need to Know About Edge Computing

Businesses are often overwhelmed with massive floods of data. In fact, large amounts of data can now be collected from sensors and IoT devices present almost anywhere in the world.

Read More