Share

Microsoft was hoarding patches for WannaCry exploit

Relying on old operating systems engenders a false sense of security that can leave users vulnerable to attacks.

Advertisement

Security experts have long warned about attacks on large numbers of unpatched systems, and while there’s a slow migration to newer systems, it’s not moving fast enough.

“The size of the outbreak is indicative of the number of machines out there which have not been patched with security updates”.

Once your files are encrypted, your options are limited.

An informative paid backup software comparison on this PCMag article.

“There are plenty of reasons people wait to patch, and none of them are good”, Ziv Mador, a security researcher at Trustwave’s Israeli SpiderLabs and a former Microsoft researcher, told Reuters. Back up your data on an offline hard drive. 4.

The latest ransomware was successful because of a confluence of factors.

The recent news that Microsoft delayed the release of a security patch created to counter WannaCry did little to help the company’s poor press, but is Microsoft really in the wrong here? Updating software will take care of some vulnerability.

Guinet, a security researcher at Paris-based Quarks Lab, published the theoretical technique for decrypting WannaCry files late Wednesday and Thursday, which Delpy, also in Paris, figured out how to turn into a practical tool to salvage files. The worst hit so far: people using Windows 7. Yes, I know that I have preached that there are instances where it is better to wait and see if a patch is going to break your system as Microsoft has released broken updates, but that timeline is in days and weeks, not months.

But Scott Vernick, a data security lawyer at Fox Rothschild that represents companies, said he was skeptical that WannaCry would produce a flood of consumer lawsuits. The malware locked down computers and threatened businesses and individuals of wiping out files from systems in a week’s time if the victim did not pay a ransom between 300 to 600 dollars.

First, it appears that this attack was not started by “phishing” where someone opens an attachment with the virus that then infects a network. System administrators should ensure that employees don’t have unnecessary access to parts of the network that aren’t critical to their work.

A ransomware that spread to more than 100 countries in just a few hours faced thousands with this very question.

Some organizations disconnect computers as a precautionary measure. On Friday, it reported 16 computer networks were shut down.

On Monday, at least 45,000 computers across the globe continued to be held hostage by malware called WannaCrypt (also known as WannaCryptor and WannaCry).

Losses from WannaCry will also be limited as the ransomware is largely hitting organizations in Europe and Asia where fewer companies buy cyber insurance, although more companies outside the USA are buying the coverage, he said.

Now, photos and documents are inaccessible, and there is an urgent red-hued message demanding payment in order to restore your files.

“We are taking the highly unusual step of providing a security update for all customers to protect Windows platforms that are in custom support only, including Windows XP, Windows 8, and Windows Server 2003”, wrote Phillip Misner security group manager at the Microsoft Security Response Center (MSRM), in a blog post.

New infections stopped Friday when a malware researcher in the United Kingdom discovered a web domain in the code.

Advertisement

“If there is a silver lining to it, you’re not out a million dollars”, he said.

5 ways to become less likely target for ransomware hackers