Introduction:
Imagine waking up to find that every PC around the world, especially those in businesses, is suddenly unusable. Business meetings are falling apart, news networks are in disarray, and flights are grounded. The chaos is beyond anything imaginable. What happened? Let’s break down the CrowdStrike blue screen chaos.
The Issue:
The issue began with a bad update from CrowdStrike Falcon. This update, intended to enhance security, accidentally turned a critical driver file into a series of zeros. As a result, computers running Falcon couldn’t boot up, leading to blue screens across the globe.
You might wonder why only Windows was affected. It’s because Windows, despite being popular, has more security vulnerabilities compared to other operating systems like macOS or Linux. Falcon’s deep integration with Windows, designed to bolster security, ironically made it a single point of failure when things went wrong.
The Fix:
Fixing this issue isn’t simple. Users need to boot in safe mode, use command prompts, and manually delete the corrupted driver file. For systems with BitLocker encryption, the process is even more complicated, requiring additional steps to decrypt the hard drive.
The various information received detail the fix below 👇
𝗣𝗵𝘆𝘀𝗶𝗰𝗮𝗹 𝗖𝗼𝗺𝗽𝘂𝘁𝗲𝗿𝘀:
-
Boot Windows into Safe Mode or the Windows Recovery Environment
-
Navigate to the 𝗖:\𝗪𝗶𝗻𝗱𝗼𝘄𝘀\𝗦𝘆𝘀𝘁𝗲𝗺𝟯𝟮\𝗱𝗿𝗶𝘃𝗲𝗿𝘀\𝗖𝗿𝗼𝘄𝗱𝗦𝘁𝗿𝗶𝗸𝗲 𝗱𝗶𝗿𝗲𝗰𝘁𝗼𝗿𝘆
-
Locate the file matching “𝗖-𝟬𝟬𝟬𝟬𝟬𝟮𝟵𝟭*.𝘀𝘆𝘀” 𝗮𝗻𝗱 𝗱𝗲𝗹𝗲𝘁𝗲 𝗶𝘁 (I would rename it to be safe).
-
Boot the host
𝗙𝗼𝗿 𝗔𝗪𝗦 (𝗔𝗺𝗮𝘇𝗼𝗻 𝗪𝗲𝗯 𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝘀), 𝗳𝗼𝗹𝗹𝗼𝘄 𝘁𝗵𝗲𝘀𝗲 𝘀𝘁𝗲𝗽𝘀:
-
Detach the EBS volume from the impacted EC2 instance.
-
Attach the EBS volume to a new EC2 instance.
-
Fix the CrowdStrike driver folder.
-
Detach the EBS volume from the new EC2 instance.
-
Attach the EBS volume back to the impacted EC2 instance.
𝗙𝗼𝗿 𝗔𝘇𝘂𝗿𝗲, 𝗳𝗼𝗹𝗹𝗼𝘄 𝘁𝗵𝗲𝘀𝗲 𝘀𝘁𝗲𝗽𝘀:
- Log in to the Azure console.
- Go to Virtual Machines and select the affected VM.
- In the upper left of the console, click “Connect”.
- Click “More ways to Connect” and then select “Serial Console”.
- Once SAC has loaded, type in ‘cmd’ and press Enter.
- Type ‘ch -si 1’ and press the space bar.
- Enter Administrator credentials.
- Type the following commands:
- ‘bcdedit /set {current} safeboot minimal’
- ‘bcdedit /set {current} safeboot network’
- Restart the VM.
- To confirm the boot state, run the command: ‘wmic COMPUTERSYSTEM GET BootupState’.
Checkout this video for a more detailed explanation 👇
https://youtu.be/GgP0EyuN8GA?si=F7WBzG8rvOld4qdh&embedable=true
Conclusion:
This incident underscores the importance of robust cybersecurity practices and the potential risks of deep system integrations.
Thanks for reading; please give a like as a sort of encouragement and also share this post on socials to show your extended support.
Follow for more ⏬