Skip Navigation
Resources Blog What's happening with the CrowdStrike incident: When a ...

What's happening with the CrowdStrike incident: When a software update turns into a cyber crisis

What's happening with the CrowdStrike incident: When a software update turns into a cyber crisis
3:32

This morning's CrowdStrike incident, where a routine update caused a cascading failure across thousands of critical systems worldwide, is a stark reminder of the fragile interconnectedness of our digital world. While this incident was a misstep, not malice, it exposes the vulnerability of our essential services.

The widespread outages should serve as a wake-up call. If an error can cause this much chaos, imagine the havoc a deliberate attack could unleash. This scenario isn't just theoretical. The potential for bad actors to exploit these weaknesses is a chilling reality.

Simultaneous attacks on critical services, like 911 dispatch and hospital systems during a mass casualty event, could have catastrophic consequences. Time will tell what today’s disruption ultimately has affected.

How uncommon is this type of incident?

This type of incident itself is fairly common - it ultimately was caused by a botched update for a popular and well regarded cybersecurity software called CrowdStrike. Botched updates happen from time to time, who among us hasn't had a new bug appear after updating software overnight? What makes this incident unique and different is how far wide spread, and how dire of an impact it had.

The faulty update triggered a Blue Screen of Death (BSOD) loop on Windows computers, rendering them useless. This was compounded by the automatic installation of the update on countless machines overnight. To make matters worse, once the computers are stuck on a death loop like this the only option is for technicians to manually apply the fix - computer by computer. This will take days in the best of cases, causing disruption far and wide.

Thousands of companies globally were crippled, and the recovery process will be painstakingly slow. 

The ripple effect of a single update (or single anything)

This incident underscores the interconnectedness of modern businesses and their reliance on complex software ecosystems.

This software supply chain at a typical company can be well over 10,000+ pieces of software and vendors. A single update, like a domino, can topple countless systems. With businesses relying on thousands of software components and vendors, the sheer volume necessitates automated updates. And, as we've seen, automation isn't foolproof.

While bad updates are inevitable, the consequences don't have to be. Organizations need to plan for these disruptions and prioritize business continuity. This incident should also prompt us to question the level of trust we place in our vendors and the robustness of our interconnected systems.

A blueprint for disaster

That said, we see the potential of this type of issue at Sonatype, often with the spread of malicious open source on the rise. If you think a botched update is bad, this incident could become a blueprint for far more insidious software supply chain attacks. Imagine a scenario where malicious code is intentionally distributed under the guise of an update, wreaking havoc on a massive scale that couldn’t be fixed with just an "update."

The stakes are too high to ignore. After we get everything sorted out, we must use this CrowdStrike incident as a catalyst to fortify our digital infrastructure against both errors and malicious intent. This should make us all stop and consider how interconnected our modern businesses are and what level of trust and reliability should be expected from our vendors.

We'll continue to keep this blog updated as we learn more about this incident and its ramifications. Sonatype's systems have not been affected by this event.

Picture of Brian Fox

Written by Brian Fox

Brian Fox is a software developer, innovator and entrepreneur. He is an active contributor within the open source development community, most prominently as a member of the Apache Software Foundation and former Chair of the Apache Maven project. As the CTO and co-founder of Sonatype, he is focused on building a platform for developers and DevOps professionals to build high-quality, secure applications with open source components.