.

  • Written by Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County
Massive IT outage spotlights major vulnerabilities in the global information ecosystem

The global information technology outage[1] on July 19, 2024, that paralyzed organizations ranging from airlines[2] to hospitals[3] and even the delivery of uniforms[4] for the Olympic Games represents a growing concern for cybersecurity professionals, businesses and governments.

The outage is emblematic of the way organizational networks, cloud computing services and the internet are interdependent, and the vulnerabilities this creates. In this case, a faulty automatic update to the widely used Falcon cybersecurity software from CrowdStrike caused PCs running Microsoft’s Windows operating system to crash[5]. Unfortunately, many servers and PCs need to be fixed manually, and many of the affected organizations have thousands of them spread around the world.

For Microsoft, the problem was made worse[6] because the company released an update to its Azure cloud computing platform at roughly the same time as the CrowdStrike update. Microsoft, CrowdStrike and other companies like Amazon have issued technical work-arounds for customers willing to take matters into their own hands. But for the vast majority of global users, especially companies, this isn’t going to be a quick fix.

Modern technology incidents, whether cyberattacks or technical problems, continue to paralyze the world in new and interesting ways. Massive incidents like the CrowdStrike update fault not only create chaos in the business world[7] but disrupt global society itself. The economic losses resulting from such incidents – lost productivity, recovery, disruption to business and individual activities – are likely to be extremely high.

As a former cybersecurity professional and current security researcher[8], I believe that the world may finally be realizing that modern information-based society is based on a very fragile foundation.

A display screen shows numerous rows of text
The outage led to thousands of flight delays on July 19, 2024. AP Photo/Yuki Iwamura[9]

The bigger picture

Interestingly, on June 11, 2024, a post on CrowdStrike’s own blog seemed to predict this very situation[10] – the global computing ecosystem compromised by one vendor’s faulty technology – though they probably didn’t expect that their product would be the cause.

Software supply chains have long been a serious cybersecurity concern[11] and potential single point of failure. Companies like CrowdStrike, Microsoft, Apple and others have direct, trusted access into organizations’ and individuals’ computers. As a result, people have to trust that the companies are not only secure themselves, but that the products and updates they push out are well-tested and robust before they’re applied to customers’ systems. The SolarWinds incident[12] of 2019, which involved hacking the software supply chain, may well be considered a preview of today’s CrowdStrike incident.

CrowdStrike CEO George Kurtz said “this is not a security incident or cyberattack[13]” and that “the issue has been identified, isolated and a fix has been deployed.” While perhaps true from CrowdStrike’s perspective – they were not hacked – it doesn’t mean the effects of this incident won’t create security problems for customers. It’s quite possible that in the short term, organizations may disable some of their internet security devices[14] to try and get ahead of the problem, but in doing so they may have opened themselves up to criminals penetrating their networks[15].

It’s also likely that people will be targeted by various scams preying on user panic or ignorance regarding the issue. Overwhelmed users might either take offers of faux assistance that lead to identity theft, or throw away money on bogus solutions to this problem.

Transportation Secretary Pete Buttigieg explains the effects of the outage on airlines and other transportation systems.

What to do

Organizations and users will need to wait until a fix is available[16] or try to recover on their own if they have the technical ability[17]. After that, I believe there are several things to do and consider as the world recovers from this incident.

Companies will need to ensure that the products and services they use are trustworthy. This means doing due diligence on the vendors of such products for security and resilience. Large organizations typically test any product upgrades and updates[18] before allowing them to be released to their internal users, but for some routine products like security tools, that may not happen.

Governments and companies alike will need to emphasize resilience[19] in designing networks and systems. This means taking steps to avoid creating single points of failure in infrastructure, software and workflows that an adversary could target or a disaster could make worse. It also means knowing whether any of the products organizations depend on are themselves dependent on certain other products or infrastructures to function.

Organizations will need to renew their commitment to best practices in cybersecurity[20] and general IT management. For example, having a robust backup system in place can make recovery from such incidents easier and minimize data loss. Ensuring appropriate policies, procedures, staffing and technical resources is essential.

Problems in the software supply chain like this make it difficult to follow the standard IT recommendation to always keep your systems patched and current. Unfortunately, the costs of not keeping systems regularly updated now have to be weighed against the risks of a situation like this happening again.

References

  1. ^ global information technology outage (theconversation.com)
  2. ^ airlines (www.wsj.com)
  3. ^ hospitals (www.nbcnews.com)
  4. ^ delivery of uniforms (www.espn.com)
  5. ^ PCs running Microsoft’s Windows operating system to crash (www.wired.com)
  6. ^ made worse (www.bleepingcomputer.com)
  7. ^ chaos in the business world (www.wsj.com)
  8. ^ security researcher (cybersecurity.umbc.edu)
  9. ^ AP Photo/Yuki Iwamura (newsroom.ap.org)
  10. ^ predict this very situation (www.crowdstrike.com)
  11. ^ serious cybersecurity concern (www.cisa.gov)
  12. ^ SolarWinds incident (www.fortinet.com)
  13. ^ this is not a security incident or cyberattack (twitter.com)
  14. ^ disable some of their internet security devices (twitter.com)
  15. ^ penetrating their networks (www.cisa.gov)
  16. ^ fix is available (www.crowdstrike.com)
  17. ^ if they have the technical ability (services.northwestern.edu)
  18. ^ test any product upgrades and updates (testsigma.com)
  19. ^ emphasize resilience (insights.sei.cmu.edu)
  20. ^ best practices in cybersecurity (www.cisa.gov)

Authors: Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County

Read more https://theconversation.com/massive-it-outage-spotlights-major-vulnerabilities-in-the-global-information-ecosystem-235155

Metropolitan republishes selected articles from The Conversation USA with permission

Visit The Conversation to see more