The CrowStrike cyber event affected 8.5 million Windows machines and was the biggest IT outage in history. It has “beaten” even the cyber attacks of WannaCry and NotPetya.
https://www.bbc.com/news/articles/cpe3zgznwjno
Can/will this method be used by hackers? What would they need to do to take advantage of that vulnerability?
Can? Probably. Will? No. They would need access to Crowdstrike’s update distribution system.