Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Exclusive: CrowdStrike crash is only the beginning…
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Exclusive: CrowdStrike crash is only the beginning…
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
VulnerabilitycybercrimeAnalysis

Exclusive: CrowdStrike crash is only the beginning…

Tony Glover
July 26, 2024 at 10:54 AM
By Tony Glover Tony Glover
Share
CrowdStrike-like vulnerabilities will persist
SHARE

CrowdStrike-like vulnerabilities will persist

The famous “blue screen of death,” witnessed with horror by 8.5 million Microsoft Windows users worldwide as a result of the ongoing CrowdStrike outage, may soon become a far more familiar sight across a wide range of sectors.

While there is no evidence that the widespread Microsoft Windows outage caused by the CrowdStrike upgrade was anything but accidental, many in the cybersecurity industry are seeing the past week’s experience as a dummy run for a full-fledged cyber-attack aimed at crippling critical infrastructure. As the current media pictures of people sleeping in airports testify, some sectors appear to be faring better than others.

According to Tim Grieveson, Senior VP of Global Cyber Risk at cybersecurity company BitSight: “It is essential that large organizations such as airlines carry out regular scenario-testing to gauge their resilience to a concerted cyber-attack or major outage such as the one we are currently experiencing. The banking sector does this, but it doesn’t feel as if the airline sector was adequately prepared this time.”

Even in the case of a glitch by CrowdStrike rather than a concerted cyber-attack by a hostile nation-state, it seems that some sectors are getting off lighter than they deserve. However, the major alarm bell now being sounded is the West’s reliance on widespread and ubiquitous software such as Microsoft Windows OS.

According to Pankit Desai, CEO of cybersecurity firm Sequretek: “Microsoft Windows OS is widely used and I was surprised to see no impact on critical infrastructure such as water treatment systems, power supplies or communications during the current outage…The widespread use of Microsoft’s Windows OS means that a significant breach would have very far-reaching and widespread consequences.”

“Organizations should try to adopt a good mix of front-end systems, rather than just relying on the Windows tech eco-system. I do, however, understand that, once the memory of the current outage starts to fade, it will be difficult to convince company board members to finance the adoption of new operating systems and proprietorial software,” adds Desai.

Sectors such as energy, telecoms and water treatment usually rely on operational technology (OT), some decades old, that was never designed to be connected to the internet and can, therefore, be hacked.

“The motto of the OT world is: ‘If it ain’t broke, don’t fix it.’  As these older OT systems are increasingly going online and many of them had not had a security in patch in years, this makes sectors such as telecoms that rely on OSS and BSS OT systems to run their office operations very vulnerable,” says Desai.

The countries mainly affected by the CrowdStrike outage, the US, UK, and India, have now revealed a gaping vulnerability in their defenses that potentially hostile nation states will be quick to exploit. Over the last two years, hacking techniques have been developed and used to successfully attack and disable critical infrastructure in locations such as the Middle East and Ukraine.

Not a question of ‘if’ but ‘when’ critical infrastructure will be taken down

“The ongoing conflict in the Ukraine has seen concerted cyber-attacks on critical infrastructure. When the conflict ends, the cyber-gangs responsible will find new targets in countries such as the US and the UK. It is now no longer a question of if but when a concerted cyber-attack will take out critical infrastructure in a major Western economy,” says Desai.

Other lessons from this week’s dummy run include the knowledge that it can take days, if not weeks, to try to get systems up and running once the Microsoft “blue screen of death,” once a familiar sight in the days of dial-up, starts appearing on screens across the West.

Shawn Waldman: CEO and Founder of cybersecurity firm Secure Cyber, says: “The current CrowdStrike outage impacting organizations worldwide is far more complex than it may appear. While CrowdStrike has issued a fix, the challenge lies in the application of this fix across vast networks. Many global agencies and large organizations have tens to hundreds of thousands of devices spread out across the globe.”

A final lesson currently being learned from the current Windows outage is not to relinquish the ability to carry out transactions manually in the event of a major outage. The general public and its elected representatives are also taking heed that the West’s rush to become a cashless society may not be the best approach after all. In the UK, for example, almost half of all UK adults were living largely cashless lives throughout 2023, according to UK Finance, with cash representing just 12 percent of all 48.1 billion payments recorded last year.

“Public-facing organizations in sectors such as retailing, aviation, and retail banking should now ensure that they can operate tills and ticketing manually in the event of another outage or, worse, a concrete cyber-attack,” says Desai.

Until Western organizations are prepared to reduce their addiction to linking every possible device or facility to the internet and until organizations start to use more varied software, it looks as if the best we can all do is put some cash under the mattress and expect the worst.

TAGGED: Cybersecurity, bitsight, Microsoft, cyber espionage, blue screen, vulnerability, windows crash, data leak, sequretek, secure cyber, banking, operating system, windows, front end, finance, ot systems, geopolitics, western economy, crowdstrike
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article CrowdStrike outage vulnerability Cybercriminals capitalize on CrowdStrike outage
Next Article Cyber attacks on commercial shipping Cyber-piracy on the high seas
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsSpyware

Spyware poses a growing threat

“Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware,” warns the Atlantic Council, a Washington, DC-based organization that promotes transatlantic cooperation and global economic prosperity. The number of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors, according to a report published by the Atlantic Council on September 10: Mythical Beasts: Diving into the depths of the global spyware market.

September 12, 2025
CybergangsNews

Teenage hackers take down JLR

Carmaker Jaguar Land Rover (JLR) has shut down its systems after suffering a cyber-attack. The group claiming responsibility for the attack, The Com, also referred to as Scattered Spider, is a loosely affiliated online community of predominantly teenage English-speaking hackers based in the UK and the US.

September 5, 2025
GovernmentGeopoliticsNewsCyber Espionage

Over half of cyber-attacks are state-sponsored

Over half of cyber-attacks exploiting known vulnerabilities are the work of state-sponsored groups from abroad, mainly from China. According to cybersecurity company Recorded Future’s research arm, Insikt Group, 53 percent of observed exploitation activity in the first half of this year was driven by state-sponsored and suspected state-sponsored actors and conducted for espionage, surveillance, or other geopolitical objectives.

September 2, 2025
Cyber EspionageSurveillanceSpywareNewsChina

China is now spying on you

The Chinese government now has a vast storehouse of confidential information belonging to key industries and individuals in the US and UK and many other countries. According to an urgent joint cybersecurity advisory issued by the US National Security Agency (NSA) and other U.S. and foreign organizations, threat actors sponsored by the Chinese government, notably Salt Typhoon, have been consistently targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally.

August 29, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?