Many enterprises in healthcare use disk encryption like Bitlocker which complicates #CrowdStrike cleanup.. This is what one IT admin reports: "We can't boot into safe mode because our BitLocker keys are stored inside of a service that we can't login to because our AD is down."
Many enterprises in healthcare use disk encryption like Bitlocker which complicates #CrowdStrike cleanup This is what one IT admin is reports: "We can't boot into safe mode because our BitLocker keys are stored inside of a service that we can't login to because our AD is down."
"[I]n order to be rebooted, some devices will require a recovery key for BitLocker ... AttackIQ’s Andrew Costis explained that the typical workaround will not work because ... keys are likely stored on devices that were also impacted, meaning the keys 'may be unrecoverable.'" https://t.co/EMWP50FRws

A significant issue has emerged for many organizations, particularly in healthcare, where the use of BitLocker disk encryption is complicating system recovery efforts, including CrowdStrike cleanup. The problem requires manual decryption of disks using BitLocker Recovery Keys, which are often stored digitally on servers that are currently non-functional. This situation has led to challenges in rebooting devices, as the necessary recovery keys may be unrecoverable. IT administrators are struggling to boot into safe mode due to inaccessible BitLocker keys, exacerbated by downed Active Directory services. AttackIQ’s Andrew Costis explained that typical workarounds are ineffective due to the impacted devices.
