July 22nd, 2024

Microsoft Blames European Commission for Major Worldwide Outage

A global PC outage caused by a CrowdStrike Falcon antivirus update affected Windows systems, leading to disruptions in various sectors. Mac and Linux remained unaffected due to different security protocols. Microsoft and CrowdStrike addressed the issue, emphasizing the importance of security measures.

Read original articleLink Icon
Microsoft Blames European Commission for Major Worldwide Outage

A major worldwide outage last Friday impacted PCs running Microsoft Windows due to an update to the CrowdStrike Falcon antivirus software. The failure caused issues for airlines, retailers, banks, hospitals, and more, with affected computers stuck in continuous recovery loops. Mac and Linux machines were not affected because they do not grant kernel access to software like Windows does. Microsoft blamed the European Commission for not being able to offer the same protections as Macs, citing an agreement from 2009 that requires them to provide third-party security apps with kernel access. Apple's macOS design, which does not allow kernel access, prevented similar havoc on Macs. The incident highlights the unintended consequences of legislation that weakens security for open access. CrowdStrike apologized for the disruption and pledged to prevent similar situations in the future. Microsoft stated that such incidents are infrequent, impacting less than one percent of Windows machines. The European Commission has been pushing for more open access in tech, potentially compromising security measures.

Related

Microsoft outage: Chaos as internet down and flights grounded around the world

Microsoft outage: Chaos as internet down and flights grounded around the world

A global IT outage, possibly linked to Crowdstrike antivirus software, caused chaos worldwide. Windows crashes affected sectors like healthcare and transportation. Crowdstrike's shares dropped. Various services faced disruptions, prompting calls for system modernization.

Microsoft/Crowdstrike outage ground planes, banks and the London Stock Exchange

Microsoft/Crowdstrike outage ground planes, banks and the London Stock Exchange

A cybersecurity program update failure caused global disruptions affecting businesses and services like United Airlines, McDonald’s, and the London Stock Exchange. Microsoft and CrowdStrike faced issues, but the problem was resolved without a cyberattack. CrowdStrike's shares dropped 20%, and Microsoft's fell 2.9%. The incident, involving Windows and security software, is one of the largest IT outages, surpassing past disruptions.

Microsoft has serious questions to answer after the biggest IT outage in history

Microsoft has serious questions to answer after the biggest IT outage in history

The largest IT outage in history stemmed from a faulty software update by CrowdStrike, impacting 70% of Windows computers globally. Mac and Linux systems remained unaffected. Concerns arise over responsibility and prevention measures.

Microsoft says 8.5M Windows devices were affected by CrowdStrike outage

Microsoft says 8.5M Windows devices were affected by CrowdStrike outage

Microsoft reported that a CrowdStrike outage impacted 8.5 million Windows devices globally, causing disruptions in banking, retail, and transportation. Collaboration with tech giants is ongoing to address cybersecurity risks efficiently.

Microsoft blames EU rules for allowing biggest IT outage to happen

Microsoft blames EU rules for allowing biggest IT outage to happen

Microsoft attributes the world's largest IT outage to EU regulations hindering security changes, causing disruptions in travel and healthcare. CrowdStrike update affected 8.5 million Windows devices, emphasizing tech companies' struggle with security and regulations.

Link Icon 12 comments
By @codeulike - 4 months
Microsoft didn't blame the European Commission for the outage (thats a ridiculous headline), they said they can't close off the Kernel due to agreements made with the European Commission. The original soruce macrumors is quoting is thie WSJ article, see last paragraph: https://archive.is/FLNKH

A Microsoft spokesman said it cannot legally wall off its operating system in the same way Apple does because of an understanding it reached with the European Commission following a complaint. In 2009, Microsoft agreed it would give makers of security software the same level of access to Windows that Microsoft gets.

By @legitster - 4 months
> Back in 2009, Microsoft agreed to interoperability rules that provide third-party security apps with the same level of access to Windows that Microsoft gets. Microsoft agreed to provide kernel access in order to resolve multiple longstanding competition law issues in Europe.

> Apple has not been forced to make changes to how Macs work, but the European Commission has been targeting the closed nature of iOS, and Apple has warned that the updates that have already been implemented could lead to security risks in the future.

This is a valid and interesting comparison - Microsoft complied and Apple fought tooth and nail.

But also, it's kind of a moot point because absolutely no one is running Apple hardware at a flight kiosk.

By @lemoncookiechip - 4 months
> The Falcon software was not able to wreak similar havoc on Macs because Apple does not give software makers kernel access. In macOS Catalina, which came out in 2020, Apple deprecated kernel extensions and transitioned to system extensions that run in a user space instead of at a kernel level. The change made Macs more stable and more secure, adding protection against unstable software updates like the one CrowdStrike pushed out. It is not possible for Macs to have a similar failure because of the change that Apple made.

What about Linux though?

Feels like this is just MS redirecting blame and using it as an opportunity to push the narrative that walled garden = good.

By @twiss - 4 months
It seems like the biggest counterargument to this would be the one made in https://www.brendangregg.com/blog/2024-07-22/no-more-blue-fr... (https://news.ycombinator.com/item?id=41033579), i.e. it should be possible to provide a safe API (like eBPF) to provide the access that third-party security apps need, without risking crashes.
By @deathanatos - 4 months
I'm not affected by this (we don't use Windows) but something that's confused me: most of the various clouds have published advisories/status page updates for this.

Are they (e.g., MS) shipping VMs in their cloud (e.g., Azure) with CrowdStrike pre-installed? In which case I think people have a right to be upset with MS, as they've chosen an apparently poor quality vendor, and the EU argument seems like a complete distraction.

Or is the market of "audit checkbox checking security software" just such a monoculture that nigh every Windows VM out there was running this thing, but that it was installed by the owners of the VM (i.e., not by the cloud vendor), and now we see what happens when unfettered updates hit a monoculture? In which case, … I don't see how MS is to blame here; seems like you, the buyer of CrowdStrike, chose poorly. (And the EU thing is even more of a distraction.) (And I guess the cloud status page updates are just out of the goodness of the cloud vendors' hearts, or we don't think Windows sysadmins are competent enough to not blame their cloud, or both.)

By @jmclnx - 4 months
Kind of a dup:

https://news.ycombinator.com/item?id=41029590

Microsoft points finger at the EU for not being able to lock down Windows

By @pradn - 4 months
The alternative is that everyone in the Microsoft security ecosystem gets off kernel-mode drivers. Once ebpf-for-windows lands, it should be possible for Microsoft, CrowdStrike, and everyone else to run their filters in user-land. That puts everyone on a level playing field, and makes the ecosystem more secure overall.

https://github.com/microsoft/ebpf-for-windows

By @simonCGN - 4 months
Big tech looking for a scapegoat for their own failings
By @ChrisArchitect - 4 months
By @aneutron - 4 months
Either someone is stupid enough to make this argument which I don't think is the case (The NT teams are crazy good), or they just want to use this opportunity to divert the blame, which is pathetic at best.

UAC, virtualization, hybrid kernel/user-space shenanigans, all were not in the OS at some point, and research and development, listening to other parties and taking inspiration from other OSes brought these advancements in security.

If Microsoft thinks offering kernel drivers for security (antivirus or otherwise) is a bad thing for the 3rd party companies, then by extension it is bad for any antiviral product they offer and they should absolutely find a new paradigm to securely implement them (eBPF like as some other folks suggested).

But saying "but apple does it !" is not a reasonable demande when your software runs respirators and nuclear facilities. (Apple are still cunts for having everything locked down but that's another conversation)