Microsoft has once again taken the extraordinary step of patching the out-of-support Windows XP, in an attempt to limit the scale of the next WannaCry-style attack.
The updates for XP and other versions of Windows, released as part of yesterday's Patch Tuesday, have fixed vulnerabilities that could be used in what Microsoft calls 'attacks with characteristics similar to WannaCrypt'.
'These security updates are being made available to all customers, including those using older versions of Windows,' wrote Adrienne Hall, general manager of Microsoft's Cyber Defense Operations Center, adding the measure was 'due to the elevated risk for destructive cyber attacks at this time'.
KB Numbers for Wanna Cry Patches for windows versions such as Windows 7 (Without SP1), Windows 8, Windows Server 2008 (Standard Edition), Windows Server 2003. I Can't find anything on the Microsoft website related to the KB details for preventing against Wanna cry attack on windows versions such as Windows 7 (Without SP1), Windows 8, Windows.
The recent WannaCry/WannaCrypt ransomware epidemic hit over 300,000 PCs in 150 countries around the globe, using worm-like capabilities to spread between unpatched Windows machines over the internet. Computer systems were knocked offline in hospitals across England, in European car plants, in Russian banks and Chinese schools and colleges.
More about Windows
- Download Security Update for Windows Server 2003 (KB4012598) from Official Microsoft Download Center. New Surface Pro 6. Stand out from the ordinary.
- A download to the security patch released by Microsoft for the 'WannaCrypt' attacks is available for versions of Windows that do not. Providing patches for Server 2003. Home > Security > General IT Security. Wannacry patches for 2003/XP Available. Search in Spiceworks How To Wanna Cry.
While the patches will be available for Windows XP, Windows Server 2003, and other unsupported operating systems, Microsoft warned people still running out-of-support OSes not to expect regular fixes.
'Our decision today to release these security updates for platforms not in extended support should not be viewed as a departure from our standard servicing policies,' said Eric Doerr, general manager for Microsoft Security Response Center.
'As always, we recommend customers upgrade to the latest platforms.'
This update for out-of-support OSes follows Microsoft's recent decision to issue a patch for unsupported OSes in the wake of the WannaCry attacks. A poll earlier this year, found 52% of firms were still running Windows XP on at least one machine.
However, security experts recently told TechRepublic that were Microsoft to start patching unsupported operating systems regularly it could increase overall risk by encouraging people to continue using less secure OSes.
Guarding against state-sponsored attacks
The decision to update unsupported OSes appears to have been driven by concerns about Windows vulnerabilities being exploited by state-backed hackers.
'In reviewing the updates for this month, some vulnerabilities were identified that pose elevated risk of cyber attacks by government organizations, sometimes referred to as nation-state actors or other copycat organizations,' Microsoft's Hall said.
The EternalBlue exploit that WannaCry used to spread itself between Windows machines was believed to have been crafted by the US National Security Agency (NSA), and used in its own hacking efforts. The exploit was later revealed by the Shadow Brokers group, after it stole a cache of vulnerabilities from the NSA-linked Equation Group.
Since yesterday's patches were issued, Microsoft has confirmed to ZDNet that the updates fix the remaining unpatched vulnerabilities from the trove revealed by the Shadow Brokers. The company had previously said it would not fix these potential exploits as they only affected older, unsupported versions of Windows.
Craig Young, security researcher at Tripwire, recommended that organizations running unsupported machines apply these patches as soon as possible.
'Anyone still using Windows Server 2003 or XP should install these patches ASAP with the expectation that they will be actively exploited in the near term,' he said.
Yesterday's updates, which also include a range of other fixes, will be automatically applied to those running Windows Update on Windows 10, Windows 8.1, Windows 7, and post-2008 Windows Server. Those running XP can download the updates from the Download Center or the Update Catalog.
Microsoft Weekly Newsletter
Be your company's Microsoft insider with the help of these Windows and Office tutorials and our experts' analyses of Microsoft's enterprise products. Delivered Mondays and Wednesdays
Sign up today Sign up today Read more on Windows and ransomware
- Microsoft warns of 'destructive cyberattacks,' issues new Windows XP patches (ZDNet)
- Microsoft: Latest security fixes thwart NSA hacking tools (ZDNet)
- Ransomware 2.0 is around the corner and it's a massive threat to the enterprise (TechRepublic)
- Want ransomware-proof Windows? Use Windows 10 S, says Microsoft (ZDNet)
- I infected my Windows computer with ransomware to test RansomFree's protection (TechRepublic)
- What is Windows 10 S? (ZDNet)
- 10 ways to protect your Windows computers against ransomware (TechRepublic)
WannaCrypt also termed as WannaCry and Wcry or Wcrypt, has already caused massive damage worldwide through its NSA-powered ransomware. The ransomware has reportedly attacked businesses, hospitals, railways stations, universities and many other organizations inflicting a major devastation.
WannaCrypt ransomware targets outdated systems
A common observation among the targeted systems is that many of them were running older Windows operating systems like Windows XP, Windows 8 and Windows Server 2003. Such systems usually do not get Microsoft support unless the organization using them opt for special custom support.
Microsoft releases Patches for Windows XP, etc
To counter this emergency situation and spread of the malware, Microsoft has released emergency fixes in the form of security patches to defend against the malware. The company even released WannaCrypt Patches for the unsupported versions of Windows OS, such as Windows XP, Windows 8 and Windows Server 2003, as well as for the supported platforms.
Describing this emergency step as highly unusual one, Microsoft said that it is providing a security update for all customers to protect Windows platforms that are in custom support only, including Windows XP, Windows 8, and Windows Server 2003.
Customers running Windows 10 were not targeted by the attack, said the company.
Patch your Windows OS right now!
For those who are still running older Windows versions, it’s time that you should patch immediately. Moving to the latest Windows version is also a good idea as Microsoft says that Windows 10 isn’t targeted.
Users who have enabled Windows Update are already protected as they will receive patch automatically. For customers using Windows Defender, Microsoft has already released an update which detects the threat as Ransom:Win32/WannaCrypt. As an additional “defense-in-depth” measure, keep up-to-date anti-malware software installed on your machines. Customers running anti-malware software from any number of security companies can confirm with their provider, that they are protected.
In case you are not able to install the patch on your PC, try following options,
- Disable SMBv1 with the steps documented at Microsoft Knowledge Base Article 2696547
- Add a rule on your router or firewall to block incoming SMB traffic on port 445
If you are lucky to haven’t been infected, make sure your security patches are up to date. Start by killing off the SMBv1, and block access to it from outside your network. As you know that there are patches already available for the malware codes, so there’s no excuse for getting caught out as a private user.
Remember to initiate the security steps urgently, as WannaCry ransomware demands $300 Bitcoin for unlocking encrypted files and the amount doubles after three days. Once infected, you are likely to receive threats that your files may be deleted permanently if the ransom is not paid within a week.
Wanna Cry Patch Kb Number
To get the download links and more information, visit this Technet post. Security patches are available for Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86, Windows XP SP2 x64, Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86, Windows 8 x64.
Wanna Cry Server 2003
TIP: Download this tool to quickly find & fix Windows errors automatically
Related Posts: