Wednesday, April 2, 2025

Microsoft says it’s unable to replicate Apple’s robust security features

As the crisis unfolded, IT teams worldwide scrambled to recover from the devastating impact of the bug, which had crippled an estimated 8.5 million Windows PCs globally. The chaos stemmed from the widespread outage, which crippled operations across multiple sectors, including aviation, healthcare, retail, and emergency services, resulting in hundreds of flight cancellations, inaccessible medical facilities, jammed store checkout counters, and a critical gap in emergency response systems.

Despite protections established by regulators, some companies weren’t impacted; conversely, has allegedly been hindered from replicating its approach due to antitrust regulations.

Microsoft reports estimated 8.5 million computers impacted by latest Windows vulnerability

Microsoft acknowledged the scope of the problem over the weekend.

We currently estimate that the vulnerability affects approximately 8.5 million Windows devices, representing less than 1% of all Windows machines worldwide. While the individual share may have been modest, the far-reaching financial and social implications of utilizing CrowdStrike resonate strongly with organizations operating critical infrastructure. 

While some might suggest that this proportion could potentially create a misleading perception. The most mission-critical PCs are likely to receive CrowdStrike installations due to the severe consequences that could arise from any malfunction on these systems. The introduction of these 8.5 million machines had a profound impact on global IT operations, resonating disproportionately throughout the industry.

CrowdStrike supplies partial clarification

Crowdstroke provided supplementary information.

On July 19, 2024, at 04:09 UTC, CrowdStrike conducted a routine sensor configuration update for Windows systems as part of its ongoing security operations. Sensor configurations remain an essential component of the continuous enhancement process for the Falcon platform’s robust safety features. The configuration replacement triggered a logic error, resulting in a system crash and a Blue Screen of Death (BSOD), affecting the impacted techniques.

It is unclear how a bug causing widespread PC crashes could have been released without detection during testing; the statement only mentions that numerous updates occur daily, leaving the explanation for this oversight unaddressed.

Macs remained unaffected due to Apple’s robust security measures.

A single faulty replacement part from a third-party supplier could trigger a catastrophic IT meltdown of monumental proportions.

Applications designed to scrutinize and analyze the fundamental operating mechanisms of computer systems are essential to identifying potential safety vulnerabilities. This entrée grants them the autonomy to upset the very methods they’re endeavouring to protect.

Macs were immune to attacks because safety apps couldn’t penetrate their operating systems at such a deep level. Without explicitly stating so, macOS performs surveillance akin to CrowdStrike’s capabilities, subsequently allowing security software access to the gathered data.

The root cause of the problem lies in CrowdStrike’s software operating at deeply embedded levels within Windows. On macOS, they won’t run at these frequencies. Apple’s Endpoint Security Framework is a modern API-based toolkit that empowers security providers to build robust security solutions for macOS. Launched in macOS 10.15 Catalina, the new feature provides a comprehensive suite of tools and services for monitoring and securing network endpoints.

The framework enables developers to monitor a range of security-related events, such as file system access, process initiation, and network connectivity. This implementation enables real-time monitoring of actions on a Mac while safeguarding consumer privacy by employing a methodology that ensures adequate safeguards are in place to prevent excessive data collection or unauthorized access, thereby limiting the level at which it can operate. 

Microsoft says it won’t take legal action against users who modify its software.

Microsoft reportedly confirms that a settlement with the EU ensures it cannot restrict low-level access to Windows.

A Microsoft spokesperson noted that the company cannot replicate Apple’s approach of completely isolating its operating system, as this was previously agreed upon with the European Commission following a complaint. In 2009, Microsoft committed to providing makers of security software equal access to Windows as they would themselves.

9to5Mac’s Take

Microsoft’s declaration here seems dubious.

Antitrust regulations ensure Apple cannot grant its personal safety software an unfair advantage over third-party applications. While seemingly compliant, such an approach may still raise concerns, nonetheless, if it adopted Apple’s identical endpoint safety framework methodology, giving third-party apps equal access to results like its own safety apps would seem fully compliant with regulations.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles