Crowdstrike causes global outage

2024-08-03

Cybersecurity company Crowdstrike pushed a broken automatic update to ~8.5M Windows computer BSOD’ing them. This has taken down hospitals, airlines, banks, 911 services, and other critical infrastructure for days.

Software, distributed systems, and an adversarial game make for a tough playing field, but this didn’t have to happen. Staged rollouts and continuous integration have been used for decades to reduce risk. This public postmortem from a cybersecurity company with this much responsibility on 2024 is shameful:

Extract from CrowdStrike PIR Executive Summary.

Crowdstrike’s focus on attack coverage and detection latency instead of higher level but harder to measure metrics like availability and intrusions, shows the problem of optimizing for the wrong metrics.

Crowdstrike.com pre-incident.

CIOs of airlines, hospitals, etc should have been more paranoid about worst-case scenarios, and governments should also have been more proactive about protecting society.

Notes

Connections

  • Iatrogenics: when the cure is worse than the illness.
  • Artificial Super Intelligence: this is one of the scenarios that worries people who are worried about super-human AIs. Instead of Windows BSOD’ing, an ASI (or a malicious actor) could take over the computers of people with access to automatic iOS, Windows, Linux updates, inject malicious code and do many types of nasty things in the span of a few seconds.
  • Complex systems: it’s hard to write bug-free software, it’s harder to do that in distributed systems, and it’s even harder to balance that out when you have adversaries (hackers) actively trying to outsmart you.
  • Antifragility: if we never had incidents like this, would we be over-engineering (no water onboard planes, the US’s TSA)? Would the cost be worth it? Where’s the right threshold for highly interconnected systems?
  • Disincentives: cybersecurity companies that take their job more seriously aren’t in the news, CIOs get punished if they don’t choose “the #1 cybersecurity tool” and they get hacked, CIOs don’t get rewarded for spending company money on insuring against black swan events.
  • Black swan events: how can you tell how far you are from extinction level events? How worse could it have been?