Microsoft reportedly held back WannaCry patch for older Windows versions
The security firm Kaspersky Lab, based in Russian Federation, noted that Microsoft had repaired the software problem that allows backdoor entry into its operating systems weeks before hackers published the exploit linked to the NSA, but also said: “Unfortunately it appears that many users have not yet installed the patch”.
The exploit, known as “EternalBlue” or “MS17-010”, took advantage of a vulnerability in the Microsoft software that reportedly had been discovered and developed by the U.S. National Security Agency, which used it for surveillance activities. However, not everyone has installed the patch yet, and those who have not are vulnerable to WannaCry.
When CNNTech first reported the Microsoft vulnerabilities leaked in April, Hickey said they were the “most damaging” he’d seen in several years, and warned that businesses would be most at risk.
WannaCry landed nine weeks after Microsoft’s patch arrived.”The same things are causing the same problems”.
Windows 8, Windows XP, and Windows Server 2003.
“That’s what makes this more troubling than ransomware was a week ago”, Thakur said. However, Microsoft has always offered agreements on custom support by way of a temporary measure.
In 2014, Microsoft ended support for the highly popular Windows XP, released in 2001 and engineered beginning in the late 1990s, arguing that the software was out of date and wasn’t built with modern security safeguards.
Here’s the link to the official update page by Microsoft, which includes patches for most of the versions. Companies can also install white listing software that prevents the downloading of unauthorized computer software. The other is to disable a type of software that connects computers to printers and faxes, which the virus exploits, O’Leary added.
Chinese media reported that more than 29,000 institutions in the country had been hit, with universities and other educational entities the hardest hit, along with railway services and retailers.
On its own, the shared code is little more than an intriguing lead. But in this case, according to Kaspersky Lab, the shared code was removed from the versions of WannaCry that are now circulating, which reduces the likelihood of such an attempt at misdirection.
Media outlets speculated the cyber attack could be related to a North Korean group, following computer code similarities found by a Google researcher.
As for Microsoft, some intelligence agency experts questioned its NSA criticism, saying it’s unreasonable for the company to ask governments to stop using its products as a way to attack and monitor enemies.
“An equivalent scenario with conventional weapons would be the USA military having some of its Tomahawk missiles stolen”, attorney Brad Smith wrote on Microsoft’s blog.
“It’s one of those things, in a flawless world, if people were up to date on the patches, this wouldn’t be a problem”, O’Leary said. For assistance regarding cyber insurance, contact David Weiss or Cristina Shea in our Insurance Recovery Group, or any other member of the group with whom you regularly work.