General

A Deep Dive Into Microsoft’s CrowdStrike Global IT Outage

24 July 2024

On July 18th 2024, the digital world descended into chaos as Microsoft experienced a global IT outage. 

As one of the largest IT outages in history, thousands of businesses and institutions around the world were knocked offline. From airports to healthcare institutes to offices and railways, the Microsoft outage has led to widespread disruptions and delays across the world. 

Cyber-security firm CrowdStrike has admitted that the issue was caused by an update to its software. However, the impact of this seemingly small error has resulted in much frustration and massive headaches for IT departments on a global scale. 

In this article, we will be covering the Microsoft outage, what caused it and how it has affected the daily lives of thousands of people. 

Let’s begin!

Breaking Down the Microsoft Global IT Outage

On Thursday, Microsoft experienced a global outage due to an issue with CrowdStrike’s Falcon Sensor software, triggering the ‘Blue Screen of Death’ on many Windows PCs. 

The Microsoft Global IT outage is a major IT issue that caused massive disruption to transport, businesses, healthcare and various other sectors around the world. This dilemma has resulted in several flights being grounded or cancelled, with endless queues and delays at many airports. 

Many cybersecurity experts have taken to calling the CrowdStrike outage the ‘largest IT outage in history’ and compared it to the Y2K bug but with a much heavier and more damaging impact. 

The Blue Screen of Death

Many PC users are aware of the various error messages that can result in panic and frustration. However, those of us who have come face-to-face with the Windows Blue Screen of Death (BSoD), understand the concern of users seeing it appear worldwide. 

The Blue Screen of Death (BSoD) is an error message screen on Windows PCs that halts all operations to display an error message. This error occurs when your system encounters a major issue, leading to unexpected restarts and even potential data loss. 

More often than not, a BSoD is prompted by hardware or software issues, however, it is not the easiest thing to resolve. While CrowdStrike claims to have identified and fixed the disastrous update, many devices remain non-operational. 

What Caused the IT Outage?

The question on everyone’s mind is, what caused this disastrous tech catastrophe?

According to the president of CrowdStrike, George Kurtz, the global IT outage was caused by a “defect found in a single content update for Windows hosts”. He goes on to confirm that this is neither a security incident nor a cyberattack and reassures the public that the issue has been identified, isolated and a fix has been deployed. 

While it may appear extreme that a piece of cybersecurity software was able to cause such widespread damage, it is important to remember that these products are deeply integrated into the inner workings of computer networks. This allows them complete access to all the inner workings of an IT system so they can operate it effectively and keep guard against any malicious attacks. 

What Is CrowdStrike?

CrowdStrike is a US cybersecurity firm based in Austin, Texas and its Falcon Sensor software is designed to protect IT systems from cyber-attacks

Similarly to many modern technology companies, CrowdStrike has not been around for very long. Founded a mere 13 years ago, it has grown to employ almost 8,500 people. 

However, in an almost ironic series of events, this time a firm that is normally part of the solution to IT problems, is instead the point of origin. 

The CrowdStrike outage serves as a reminder of the fragility of our modern digital infrastructure, demonstrating how a company that is not exactly a household name can be at the heart of a global tech crisis. This reinforces the importance of having data backups and several lines of defence to mitigate the impact for your business. 

Who Has Been Affected?

The Microsoft global IT outage had a widespread impact and affected various platforms such as Microsoft 365, Amazon Web Services, Azure and even social media platforms like Instagram and eBay. 

On a worldwide scale, airports and air travel were particularly badly hit with at least 1,400 flights being cancelled and several other flights being delayed. Similarly, many railway companies across the UK have reported delays and widespread IT issues.

Payment systems were also impacted forcing many shops to conduct cash-only transactions. London cabbies were left struggling to take card payments while supermarkets including Waitrose and Morrisons were unable to accept contactless payments. 

Healthcare was another sector that was badly affected with many GP practices facing trouble booking appointments, accessing patient records and viewing test results. Even broadcasters, including Sky News, were caught up in the technical chaos and spent several hours off air. 

As a result of the global IT outage, CrowdStrike’s shares are reportedly down by more than 20% in pre-marketing trading, equalling a loss of over £12.3bn in value. 

Many cybersecurity experts believe that although a software fix is now available, it will take a huge amount of work to get all computer devices up and running again. 

Despite the serious nature of this international predicament, users took to social media to joke about the early weekend arrival. With the hashtag #MicrosoftOutage trending, many shared memes and humorous takes on the situation. One user joked, “Looks like the weekend started early thanks to Microsoft!”

Contact Redpalm For Comprehensive IT Security Services! 

While the Microsoft global IT outage may have occurred due to an error on the part of a cybersecurity firm, cybersecurity services are still a necessity if you wish to protect your networks from cyber-attacks and data breaches. 

Redpalm is an MSP that provides professional IT support paired with the latest cybersecurity solutions to safeguard your IT systems. With years of knowledge and expertise, our team of IT experts are well-equipped to identify and mitigate any risks on an immediate basis. 

We also offer services like vulnerability assessments, technology procurement, incident response, IT audits and health checks and so much more!

To learn more about our services, click here or contact us to schedule an appointment today!

Latest From The Blogs

cyber criminal tactics, two individuals hacking into a computer system
Uncategorized

7 Common Cyber Criminal Tactics to Watch Out For

Cyber crimes are attempts by cyber criminals, hackers or other malicious individuals to gain unauthorised access to a computer network or system. These attacks often target a range of victims, from individual users to organisations and even governments, which begs the question, can cyber crime be curbed?

Read More
improve online security, a person using a laptop with visual of security overlaid on top of image
Cyber Security

6 Simple Ways to Boost Your Company’s Online Security

Online security, aka cyber security, involves protecting your business’s sensitive information and critical systems from unauthorised access and theft. With data networks being almost universal, fraudsters are becoming more and more innovative with their scams. Every day, countless cyber criminals scan unsecured or poorly secured networks, looking for an opportune moment to attack.

Read More
phishing email scam, paper email icon on a hook above a laptop
Cyber Security

A Deep Dive Into HR Phishing Email Scams

Have you ever received an email from your HR team that appeared too good to be true? Or perhaps there was something about it that sounded a little off. Beware—you may have narrowly avoided falling into the clutches of an HR phishing email scam.

Read More
technology as a service, engineer in data center
General

The Benefits of Technology as a Service (TaaS) 

Traditionally, IT infrastructure necessitated a server installed on your business premises to allow access to hardware and software applications. If you wanted to scale your data storage and services, you had to purchase additional hardware or invest in expensive upgrades.

Read More
edge computing, woman inspecting servers
General, Hybrid IT, Managed IT Services

Everything You Need to Know About Edge Computing

Businesses are often overwhelmed with massive floods of data. In fact, large amounts of data can now be collected from sensors and IoT devices present almost anywhere in the world.

Read More
physical security, hologram with pictured graphics symbolising security
Cyber Security

Why Your Business Needs Both Cyber & Physical Security 

As technology continues to advance, organisations are beginning to face increasingly complex security threats, both in the physical and digital world. While physical security and cybersecurity are often treated as separate issues, they are very closely connected.

Read More
future of cloud computing, man using a hologram representation of cloud network
General, Managed IT Services

A Deep Dive Into the Future of Cloud Computing

The cloud significantly disrupted the traditional IT landscape and the momentum of cloud services shows no signs of slowing down. With all this in mind, the future of cloud computing looks bright.

Read More
benefits of cyber essentials, IT team discussion besides montors
Business, Cyber Security

5 Benefits Of Cyber Essentials Certification

The good news is that obtaining a Cyber Essentials certification is simple and can help you safeguard your business against common cyber threats. Designed by the government, Cyber Essentials is a cyber security certification that gives organisations a certain level of protection.

Read More
investing in new technology, woman looking confident and holding a tablet
Technology Procurement

Questions to Ask Before Investing in New Technology

Read More
IT security audit, It technician looking serious in front of a computer
General

Common IT Security Audit Mistakes to Avoid

Maintaining a robust security posture is crucial for organisations, regardless of size or industry. As such, IT security audits play a big role in helping identify vulnerabilities, assess controls and ensure compliance.

Read More