Security

CrowdStrike deja vu as 'performance issue' leaves systems sluggish

Not related to the massive outage in July, security biz spokesperson told us


Some IT administrators suffered a moment of deja vu on Thursday morning as CrowdStrike blamed a cloud service issue for performance problems and lagging boot times affecting some of European customers.

"CrowdStrike hits again," noted one admin on Reddit, along with: "At least it's not on a Friday."

While it likely needs no explanation, the customer is referring to that fatal Friday in July when a faulty file update inadvertently led to what may well be the largest IT outage in history.

Another admin reports their organization "had performance issues being reported all day," including "delays and slowness when running things."

Luckily for the embattled security vendor and its customers, however, there was no blue screen of death this time around, nor does it appear that this remediation will ruin any admins' weekend plans. CrowdStrike says it has now fixed the problem, and there's nothing to worry about.

The security biz posted its original alert at 0850 UTC on Thursday:

CrowdStrike identified a performance issue with a cloud service that may cause degraded performance and boot times for some customer systems. This issue impacted customers in our EU-1 cloud. CrowdStrike Falcon customers are still protected.

CrowdStrike has scaled the impacted cloud service. Sensor performance is stabilizing. CrowdStrike is continuing to monitor the situation.

A status update from 1220 UTC said performance was returning to normal, and a spokesperson told The Register that it had fixed the issue.

"CrowdStrike identified and resolved a cloud performance issue this morning that had caused system delays for a small segment of EU cloud customers," a company spokesperson said. "This is not related to the Channel File 291 incident, and all customers have remained protected throughout." 

The spokesperson declined to say how many customers were affected by the issue: "A nominal number of customers were affected."

The Channel File 291 incident, of course, refers to the flawed Falcon endpoint defense software update that boot-looped millions of Windows computers worldwide last month.

CrowdStrike is now facing legal threats from Delta Air Lines, which claims the IT meltdown cost it more than $500 million, as well as a class-action lawsuit from investors for making false and misleading statements about its software.

Earlier this month at DEF CON, CrowdStrike President Michael Sentonas accepted the Pwnie Award for Most Epic Fail and admitted, "we got this horribly wrong." ®

Send us news
14 Comments

CrowdStrike's meltdown didn't dent its market dominance … yet

Total revenue for Q2 grew 32 percent

House to grill CrowdStrike exec on epic IT meltdown... no, not the CEO

VP Adam Meyers to testify about that faulty software update which ruined July and some of August

CrowdStrike hires outside security outfits to review troubled Falcon code

And reveals more and more about small mistake that bricked 8.5M Windows boxes

Post-CrowdStrike, Microsoft to discourage use of kernel drivers by security tools

Now there's an idea – parsing config data in user mode

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

Delta: CrowdStrike's offer to help in Falcon meltdown was too little, too late

Airline unimpressed with 'unhelpful and untimely' phone call from CEO, Falcon maker says claims untrue

Security boom is over, with over a third of CISOs reporting flat or falling budgets

Good news? Security is still getting a growing part of IT budget

Security biz Verkada to pay $3M penalty under deal that also enforces infosec upgrade

Allowed access to 150K cameras, some in sensitive spots, but has been done for spamming

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

White House thinks it's time to fix the insecure glue of the internet: Yup, BGP

Better late than never

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Microsoft security tools questioned for treating employees as threats

Cracked Labs examines how workplace surveillance turns workers into suspects