Cyber Security News

CrowdStrike Releases Fix for Updates Causing Windows to Enter BSOD Loop

CrowdStrike has issued a fix for a problematic update that caused numerous Windows systems to experience the Blue Screen of Death (BSOD), rendering them inoperable.

This issue, which did not affect Mac or Linux hosts, was not a result of a security incident or cyberattack but stemmed from a defect in a single content update for Windows hosts.

Fixes Released for CrowdStrike Update Error

The problem was traced to the Falcon Sensor update, specifically the channel file “C-00000291*.sys,” with a timestamp of 0409 UTC, which caused systems to crash with a BSOD error.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

CrowdStrike’s engineering team quickly identified and isolated the issue, reverting the changes and deploying a fix. The updated channel file, now with “C-00000291*.sys” with the timestamp of 0527 UTC or later, should prevent further occurrences of the error.

Systems that have not been impacted do not require any action, and those brought online after 0527 UTC will also not be affected.

Impact and Mitigation Steps

The faulty update significantly impacted various sectors, including banks, airlines, supermarkets, and television broadcasters, causing widespread disruption.

IT administrators were advised to manually boot affected systems into Safe Mode or the Windows Recovery Environment to delete the problematic driver file. This workaround, while effective, often required physical access to the machines and could be complicated by disk encryption tools like BitLocker.

For Individual hosts, CrowdStrike provided the following steps:

  1. Boot Windows into Safe Mode or the Windows Recovery Environment.
  2. Navigate to the C:\Windows\System32\drivers\CrowdStrike directory.
  3. Locate and delete the file matching “C-00000291*.sys”.
  4. Boot the host normally.

Workaround for Public Cloud Environments

Option 1:

  • ​​​​​​​Detach the operating system disk volume from the impacted virtual server
  • Create a snapshot or backup of the disk volume before proceeding further as a precaution against unintended changes
  • Attach/mount the volume to to a new virtual server
  • Navigate to the %WINDIR%\System32\drivers\CrowdStrike directory
  • Locate the file matching “C-00000291*.sys”, and delete it.
  • Detach the volume from the new virtual server
  • Reattach the fixed volume to the impacted virtual server

Option 2:

  • ​​​​​​​Roll back to a snapshot before 0409 UTC.

CrowdStrike has also provided solutions for addressing AWS, Azure, and Bitlocker recovery issues.

The incident underscores the risks associated with automatic updates for security software and highlights the need for rigorous testing and staged rollout policies.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

PupkinStealer Attacking Windows Users to Steal Browser Login Credentials

A newly discovered information-stealing malware dubbed "PupkinStealer" has emerged as a significant threat to Windows…

30 minutes ago

Asus One-Click Vulnerability Let Attackers Execute Malicious Remote Code

A critical vulnerability discovered in ASUS's DriverHub utility allowed malicious websites to execute arbitrary code…

36 minutes ago

Hackers Exploiting PyInstaller to Deploy Undetectable macOS Infostealer

Cybersecurity experts have recently uncovered a new breed of information-stealing malware that leverages legitimate development…

1 hour ago

North Korean Hackers Leveraging Academic Forum Invitation & Dropbox to Deliver Malware

In March 2025, a sophisticated spear phishing campaign attributed to the North Korean state-sponsored hacking…

2 hours ago

SAP May 2025 Patch Tuesday – Patch for Actively Exploited 0-Day & 15 Vulnerabilities

SAP's May 2025 Security Patch Day includes an urgent update to the previously released emergency…

3 hours ago

Researchers Uncovered North Korean Nationals Remote IT Worker Fraud Scheme

In a significant cybersecurity investigation, researchers have revealed an elaborate fraud scheme orchestrated by North…

3 hours ago