Industry

Jul 25, 2024

Why Web3 Users Were Unfazed by CrowdStrike Outage

Last week’s CrowdStrike outage initiated by a defect in a Microsoft OS update affected various industries across the globe. CrowdStrike, a leading provider of endpoint protection, relies on various operating system functionalities to ensure seamless integration and performance of its security solutions. This incident illustrated the vulnerability of centralized systems, especially given the complex interdependencies within the software ecosystem. Sectors such as airlines, hospitals, and financial institutions experienced major difficulties during this cyber outage.

In contrast, the decentralized nature of blockchain technology and cryptocurrency systems showed remarkable resilience. Unlike centralized systems, where a single point of failure can have widespread consequences, decentralized systems distribute risk and functionality across multiple nodes. This distribution ensures that even if one component fails, the overall system remains operational.

Web3 users, operating in a decentralized environment, continued their activities without interruption on the date of the incident, demonstrating the robustness of decentralized networks in the face of systemic issues. The CrowdStrike outage is an interesting example of why decentralization is beneficial for cybersecurity.



What Went Wrong?

When CrowdStrike's agent software attempted to execute certain operations on July 19th, 2024, it encountered a null pointer exception—a type of error that occurs when the software tries to access a piece of data at a memory location that hasn't been initialized. This null pointer exception was triggered by the changes in the OS update, leading to a chain reaction of system failures. As a result, many computers experienced blue screens of death (BSOD), effectively shutting down systems and rendering them unusable.

BSOD in Times Square during CrowdStrike Outage

Why This Should Never Have Happened

The deployment of such a critical error raises several concerns about software development and quality assurance practices. Here are the key points:


1. Insufficient Testing: The update evidently did not undergo rigorous testing. A null pointer exception is a fundamental error that should have been caught during the initial testing phases.

2. Lack of Redundancy: Robust endpoint protection systems should have fallback mechanisms to prevent a single point of failure from causing widespread outages. The absence of such mechanisms in CrowdStrike's software exacerbated the issue.

3. Rapid Deployment Without Safeguards: The update was deployed rapidly, possibly without adequate safeguards in place to roll back changes or mitigate potential issues swiftly.


The Larger Implications

This incident highlights a broader issue within the cybersecurity industry: the potential dangers of relying on third-party endpoint protection software. While these tools are designed to enhance security, they can become significant vulnerabilities if not properly managed. Here’s why:


1. Single Point of Failure: As demonstrated, a critical flaw in widely used endpoint protection software can have devastating consequences on a massive scale.

2. Trust Issues: Businesses and individuals place a great deal of trust in these security solutions. When they fail, it undermines confidence in cybersecurity measures as a whole.

3. Complexity and Overhead: The integration and management of third-party security software add complexity to IT environments, which can introduce new risks and challenges.


Threat Actors Exploiting the Situation

Threat actors are exploiting the massive business disruption from CrowdStrike's glitchy update to target companies with data wipers and remote access tools. These hackers are taking advantage of the situation by posing as CrowdStrike representatives and offering fraudulent fixes. Unsuspecting companies, desperate to restore their systems, may fall victim to these scams, inadvertently installing malicious software that can further compromise their data and network security.


The Resilience of the Web3 Industry


Crypto users showcased impressive stability during the CrowdStrike outage. While industries like airlines, hospitals, and financial institutions experienced significant disruptions, the crypto market kept running smoothly. This stability can be attributed to several factors that are inherent to decentralized technology.

One of the key factors contributing to this resilience is the nature of decentralized finance (DeFi) itself. Blockchain-native companies, which operate on decentralized networks, are designed to withstand such disruptions. According to blockchain researcher and former Naijacrypto CEO, Chiagozie Iwu, the elements of node-based decentralization provide a robust defense against centralized outages. This inherent design mitigates risks and ensures that critical functions continue uninterrupted, even during widespread IT issues like those experienced during the CrowdStrike incident.

Institutional investment in cryptocurrencies has also played a crucial role in maintaining stability. As more institutions enter the digital asset space, they bring advanced security measures and diversified portfolios. These factors help absorb shocks from isolated incidents, further enhancing the robustness of the crypto market. Olumide Adesina, an analyst at Quantum Economics, highlighted that the incident underscored the viability of blockchain as an alternative to traditional IT systems, which are more susceptible to single points of failure.

Blockchain technology itself offers significant advantages in mitigating outages. Decentralized storage solutions, such as the InterPlanetary File System (IPFS), distribute data across multiple nodes, making it nearly impossible for a single outage to disrupt the entire system. Additionally, consensus mechanisms like Proof of Stake (PoS) or Proof of Work (PoW) provide redundancy and security, ensuring data integrity and availability even if a few nodes fail.

However, while decentralized platforms displayed resilience, centralized crypto platforms could face similar risks in the future. Centralized exchanges and services, which often rely on single points of infrastructure, are more vulnerable to outages and cyberattacks. These platforms should consider integrating decentralized cloud-based architectures to bolster their security.

To further protect against potential disruptions, centralized crypto platforms should implement robust disaster recovery plans and maintain frequent backups. Utilizing multi-cloud strategies and diversifying infrastructure providers can also mitigate risks associated with relying on a single service provider. Additionally, implementing advanced endpoint security measures and exploring decentralized security solutions can help safeguard against vulnerabilities.

The Dangers and Impact of Centralized Systems

Centralized systems, while offering certain advantages such as simplified management and streamlined decision-making processes, come with a host of vulnerabilities that can have far-reaching consequences. The recent CrowdStrike outage serves as a poignant example of these dangers, particularly the risk of a single point of failure. In centralized architectures, all data and control mechanisms are concentrated in one location or under one authority, creating a critical vulnerability. If this central point is compromised, the entire system can collapse, leading to widespread disruptions. During the CrowdStrike outage, industries heavily reliant on centralized systems experienced severe operational issues. Flights were delayed, medical records became inaccessible, and financial transactions were halted, illustrating the cascading effects of such failures.

Additionally, crisis management in centralized systems can be inefficient. The concentration of responsibility in one central authority often leads to delays in problem resolution, as seen when affected companies had to wait for CrowdStrike's technical team to address the outage.

Another critical issue is that centralized systems must navigate complex compliance and regulatory landscapes, which can be challenging to manage across different regions. Any lapse in adherence can result in penalties and erode user trust. Centralized entities often struggle with meeting diverse regional regulations simultaneously, which can complicate global operations.

Conclusion


While centralized systems offer certain operational efficiencies and control benefits, they come with significant risks that cannot be ignored. The single point of failure inherent in such systems makes them highly susceptible to outages and cyber attacks. Additionally, their lack of redundancy measures and inefficiency in crisis management further compound these vulnerabilities. The CrowdStrike outage serves as a cautionary tale for industries dependent on centralized architectures, underscoring the need for more resilient solutions like decentralized systems.



Sources:


  1. "CrowdStrike Blackout: Impact on Crypto Firms." Cointelegraph, 2024. cointelegraph.com/news/crowdstrike-blackout-impact-crypto-firms.
  2. "Crypto Community Reacts: Windows and CrowdStrike Outage, Blockchains Unaffected." Cointelegraph, 2024. cointelegraph.com/news/crypto-community-reacts-windows-crowd-strike-outage-blockchains-unaffected.
  3. "Crypto Appears Unaffected by Global CrowdStrike Outages." Protos, 2024. protos.com/crypto-appears-unaffected-by-global-crowdstrike-outages.
  4. Singh, Shish. "The Great Fall: Decoding the CrowdStrike-Microsoft Outage of July 2024." Dev.to, 2024. dev.to/shishsingh/the-great-fall-decoding-the-crowdstrike-microsoft-outage-of-july-2024-19bo.
  5. "Endpoint Security." CrowdStrike, 2024. crowdstrike.com/cybersecurity-101/endpoint-security/.



About Chain

Chain is a blockchain infrastructure solution company that has been on a mission to enable a smarter and more connected economy since 2014. Chain offers builders in the Web3 industry services that help streamline the process of developing, and maintaining their blockchain infrastructures. Chain implements a SaaS model for its products that addresses the complexities of overall blockchain management. Chain offers a variety of products such as Ledger, Cloud, and NFTs as a service. Companies who choose to utilize Chain’s services will be able to free up resources for developers and cut costs so that clients can focus on their own products and customer experience. Learn more: https://chain.com.

Connect with Chain for the latest updates:

X (Previously Twitter): x.com/Chain

Facebook: facebook.com/Chain

Instagram: instagram.com/Chain

Telegram: t.me/Chain

TikTok: tiktok.com/@Chain

Youtube: youtube.com/Chain





Chain News & Updates

Latest News & Updates

Sign up for the Chain Newsletter - a weekly roundup of new platform features and the latest from the industry.