{"id":274,"date":"2024-09-09T14:49:02","date_gmt":"2024-09-09T12:49:02","guid":{"rendered":"https:\/\/eniware-systems.com\/?p=274"},"modified":"2025-01-27T16:30:36","modified_gmt":"2025-01-27T15:30:36","slug":"crowdstrike-krise-ein-weckruf-fuer-technologische-unabhaengigkeit","status":"publish","type":"post","link":"https:\/\/eniware-systems.de\/en\/crowdstrike-krise-ein-weckruf-fuer-technologische-unabhaengigkeit\/","title":{"rendered":"CrowdStrike Crisis: A Wake-Up Call for Technological Independence"},"content":{"rendered":"<p>In our first blog post, we discussed technological independence as the key to better IT solutions. Ironically, shortly afterward, an event of enormous scale, with global repercussions, underscored the importance of this discussion: the CrowdStrike crisis, described by experts as the<a href=\"https:\/\/www.crn.com\/news\/security\/2024\/crowdstrike-pins-massive-microsoft-outage-on-logic-error-in-falcon-update#:~:text=The%20defective%20CrowdStrike%20Falcon%20update,IT%20outage%20of%20all%20time.\">\"largest IT outage in history.\"<\/a>&#8222;.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Happened?<\/strong><\/h2>\n\n\n\n<p>On July 19, 2024, CrowdStrike released an update for its Falcon security tool, which caused massive problems on Windows systems. This faulty update led to crashes and IT outages worldwide. At least <a href=\"https:\/\/medcitynews.com\/2024\/07\/crowdstrike-healthare-it-technology-windows\/\">8.5 million<\/a> devices were affected, though the actual number may be higher, as only devices that submitted error reports were counted.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Background of the Crisis<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/07\/27\/windows-security-best-practices-for-integrating-and-managing-security-tools\/?utm_source=tldrwebdev\">The error<\/a> resulted from an incompatibility between the update and Windows kernel components. The kernel is the central part of an operating system that has direct access to hardware. Security software that interacts deeply with the kernel significantly increases complexity and the risk of errors. The problem was so severe that many devices entered an endless restart cycle, and users were confronted with the infamous \"Blue Screen of Death\" (BSOD).<\/p>\n\n\n\n<p>A significant factor enabling this crisis was a court ruling that required Microsoft to make its kernel accessible to external security software. This decision was intended to weaken Microsoft\u2019s monopoly and foster competition. Ironically, this also allowed for deeper interactions with the operating system, increasing the likelihood of <a href=\"https:\/\/www.mcafee.com\/blogs\/security-news\/crowdstrike-outage-provides-opportunities-for-scammers\/\">critical errors<\/a> .<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Scale of the Impact<\/strong><\/h2>\n\n\n\n<p>In just one day, the crisis caused global disruptions affecting fundamental sectors such as healthcare, finance, government, transportation, and media. <a href=\"https:\/\/medcitynews.com\/2024\/07\/crowdstrike-healthare-it-technology-windows\/\">Hospitals<\/a> like Kaiser Permanente and Providence Health had to revert to manual operations. In Alaska, the 911 emergency call system was affected, and railway companies in several countries experienced significant operational disruptions. In Germany, there were severe repercussions as well: Eurowings had to temporarily suspend all domestic and UK flights. <a href=\"https:\/\/heavymeta.org\/2024\/07\/28\/crowdstrikes-impact-on-aviation.html?utm_source=tldrnewsletter\">The aviation industry<\/a> was massively affected, resulting in significant financial losses. <a href=\"https:\/\/www.dw.com\/en\/global-cyber-outage-blamed-on-security-software-update\/live-69710008\">The supermarket chain Tegut<\/a> had to close over 300 stores because their checkout systems stopped working. Cloud monitoring firm Parametrix estimates that Fortune 500 companies in the U.S. alone lost around $5.4 billion, with healthcare bearing the <a href=\"https:\/\/medcitynews.com\/2024\/07\/crowdstrike-healthare-it-technology-windows\/\">greatest direct financial losses<\/a> . <a href=\"https:\/\/insights.cybcube.com\/en\/crowdout-preliminary-estimate\">According to Cybcube,<\/a> the total cost of the disruption could reach $10 billion.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Dependencies and Risks<\/strong><\/h2>\n\n\n\n<p>Heavy reliance on major IT providers increases vulnerability. A single error in a central software component can have global repercussions. Security software that interacts deeply with the kernel significantly increases <a href=\"https:\/\/blog.devolutions.net\/2024\/07\/the-crowdstrike-it-outage-what-we-know-and-lessons-learned-so-far\/\">complexity and the risk of errors<\/a> . This crisis highlights how dependent many companies are on a small number of major providers. <a href=\"https:\/\/www.mcafee.com\/blogs\/security-news\/crowdstrike-outage-provides-opportunities-for-scammers\/\">A single failure<\/a> at one provider can trigger a chain reaction, paralyzing entire networks and disrupting critical services.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Power of Major Tech Corporations<\/strong><\/h2>\n\n\n\n<p>The concentration of power among large tech corporations is influenced by legal and regulatory factors that often bolster their market dominance. Microsoft\u2019s integration into many corporate networks demonstrates how such companies occupy central positions in IT infrastructure and exert significant influence. This concentration of power and dependencies poses substantial risks, as a single error can have <a href=\"https:\/\/www.forbes.com\/sites\/davidphelan\/2024\/07\/22\/crowdstrike-outage-microsoft-blames-eu-while-macs-remain-immune\/\">far-reaching consequences<\/a> . Despite regulatory constraints, <a href=\"https:\/\/www.theverge.com\/2024\/7\/23\/24204196\/crowdstrike-windows-bsod-faulty-update-microsoft-responses?utm_source=tldrnewsletter\">Microsoft remains obliged<\/a>to improve its security infrastructure and minimize risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Critical Analysis and Solutions<\/strong><\/h2>\n\n\n\n<p>While CrowdStrike is a major player in its sector, it does not have a monopoly; its Falcon tool is installed on only about 1% of all PCs, primarily in business environments and on critical Windows devices, which is why the impact was particularly severe here. Microsoft, on the other hand, provides about 70% of desktop operating systems globally, amplifying the effects of the outage and impacting <a href=\"https:\/\/www.mcafee.com\/blogs\/security-news\/crowdstrike-outage-provides-opportunities-for-scammers\/\">millions of people worldwide<\/a> .<\/p>\n\n\n\n<p>The House Committee thanked CrowdStrike for its coordination but expressed concerns about the \"global dimension of this incident\" and its implications for national security, as malicious actors could exploit <a href=\"https:\/\/arstechnica.com\/tech-policy\/2024\/07\/crowdstrikes-ubiquity-under-fire-as-congress-calls-for-ceo-to-testify\/?utm_source=tldrinfosec\">such vulnerabilities<\/a> k\u00f6nnten. <a href=\"https:\/\/x.com\/linakhanFTC\/status\/1814395610788929649\">Lina Khan<\/a>, FTC Chair, commented on X (formerly Twitter), \"These incidents demonstrate how concentration creates fragile systems.\"<\/p>\n\n\n\n<p>Microsoft\u2019s Security Chief David Weston emphasized the importance of secure provisioning and disaster recovery, reminding everyone how crucial it is to <a href=\"https:\/\/arstechnica.com\/tech-policy\/2024\/07\/crowdstrikes-ubiquity-under-fire-as-congress-calls-for-ceo-to-testify\/?utm_source=tldrinfosec\">remain vigilant across the entire technology ecosystem<\/a>. Cloudflare-CEO <a href=\"https:\/\/www.theverge.com\/2024\/7\/23\/24204196\/crowdstrike-windows-bsod-faulty-update-microsoft-responses?utm_source=tldrnewsletter\">Matthew Prince<\/a>warned that Microsoft might favor its own security products if it continues to harden Windows, which could lead to new problems and further market concentration.<\/p>\n\n\n\n<p>Regulatory pressures may limit Microsoft\u2019s ability to take drastic security measures. A Microsoft spokesperson explained that the company cannot secure its operating system in the same way as Apple due to a 2009 <a href=\"https:\/\/www.forbes.com\/sites\/davidphelan\/2024\/07\/22\/crowdstrike-outage-microsoft-blames-eu-while-macs-remain-immune\/\">agreement with the European Commission<\/a> aimed at fostering competition. <a href=\"https:\/\/www.theverge.com\/2024\/7\/23\/24204196\/crowdstrike-windows-bsod-faulty-update-microsoft-responses?utm_source=tldrnewsletter\">CrowdStrike CEO<\/a> frequently criticizes Microsoft\u2019s security record, highlighting that alternatives become easier to sell as long as Microsoft continues to face security issues.<\/p>\n\n\n\n<p>This incident underscores the dependence on existing monopolies in the IT landscape. Open-source solutions offer transparency, flexibility, and security benefits. They can help companies reduce reliance on major IT providers. We encourage our clients to adopt <a href=\"https:\/\/blog.devolutions.net\/2024\/07\/the-crowdstrike-it-outage-what-we-know-and-lessons-learned-so-far\/\">open-source technologies<\/a> to promote technological independence and retain control over their infrastructure. Successful implementation of these technologies is essential to prevent similar crises in the future.<\/p>\n\n\n\n<p>In conclusion, the CrowdStrike crisis highlights the risks of dependence on large tech corporations. A stronger focus on technological independence and open-source solutions could help make the IT landscape <a href=\"https:\/\/blog.devolutions.net\/2024\/07\/the-crowdstrike-it-outage-what-we-know-and-lessons-learned-so-far\/\">more resilient and secure<\/a> .    <\/p>","protected":false},"excerpt":{"rendered":"<p>Die CrowdStrike-Krise verdeutlicht die Abh\u00e4ngigkeit von gro\u00dfen IT-Konzernen und deren Risiken. Durch ein fehlerhaftes Update kam es weltweit zu IT-Ausf\u00e4llen, die viele Sektoren wie Gesundheitswesen und Luftfahrt beeintr\u00e4chtigten. Dies zeigt, wie anf\u00e4llig zentrale IT-Infrastrukturen sind. L\u00f6sungen umfassen eine verst\u00e4rkte Nutzung von Open-Source-Technologien zur F\u00f6rderung technologischer Unabh\u00e4ngigkeit und zur Erh\u00f6hung der IT-Sicherheit.<\/p>","protected":false},"author":3,"featured_media":276,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1,12,18,13,17,14],"tags":[24,20,19,21],"class_list":["post-274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","category-datensouveraenitaet","category-it-sicherheit","category-open-source","category-technologische-entwicklungen","category-unternehmensphilosophie","tag-datensouveraenitaet","tag-it-sicherheit","tag-tech-konzerne","tag-technologische-unabhaengigkeit"],"_links":{"self":[{"href":"https:\/\/eniware-systems.de\/en\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"https:\/\/eniware-systems.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eniware-systems.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eniware-systems.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/eniware-systems.de\/en\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":7,"href":"https:\/\/eniware-systems.de\/en\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":482,"href":"https:\/\/eniware-systems.de\/en\/wp-json\/wp\/v2\/posts\/274\/revisions\/482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eniware-systems.de\/en\/wp-json\/wp\/v2\/media\/276"}],"wp:attachment":[{"href":"https:\/\/eniware-systems.de\/en\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eniware-systems.de\/en\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eniware-systems.de\/en\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}