Jump to content

Recommended Posts

A day after a ransomware worm infected 75,000 machines in 100 countries, Microsoft is taking the highly unusual step of issuing patches that immunize Windows XP, 8, and Server 2003. Microsoft also rolled out a signature that allows its Windows Defender antivirus engine to provide "defense-in-depth" protection. The moves came after attackers on Friday used a recently leaked attack tool developed by the National Security Agency to virally spread ransomware known as "WCry" or "WannaCrypt." Within hours, computer systems around the world were crippled, prompting hospitals to turn away patients while telecoms, banks, and companies such as FedEx were forced to turn off computers for the weekend. The chaos surprised many security watchers because Microsoft issued an update in March that patched the underlying vulnerability in Windows 7 and most other supported versions of Windows

Share this post


Link to post
Share on other sites
rokytnji   

Running the ultimate patch.

$ uname -a
Linux biker 4.10.1-antix.1-686-smp-pae #3 SMP Mon Feb 27 12:47:06 EET 2017 i686 GNU/Linux

:angel_to_devil:

 

Big But though. Most Hospital software was/are wrote for Windows XP.  Why the hell they go online is just a wonderment to me though. Main, in house servers, that share over the internet, should be locked down and patched. Blocking that worm that crawls into XP.  I know our small city hall has a IT employee with his own office.

With what a hospital charges for a stay. There should be whole IT team. I would think.

:dunno:

Kinda gibberish to me,  reading your link Shay.

Quote

WannaCry is mundane, nothing special

But

 

Quote

researchers have yet to find a flaw in the WannaCry ransomware encryption process to allow them to restore the victims' files

So my take on that is " Well. The .25 caliber bullet is mundane and nothing special. It is not as good as let's say a .357 caliber. But the dude died anyway."

Share this post


Link to post
Share on other sites
Shay   

Why I have not fired up any windows rigs. Yes, they are Win 10.

$ uname -a
Linux antix16 4.10.1-antix.1-amd64-smp #1 SMP PREEMPT Sun Feb 26 23:37:14 EET 2017 x86_64 GNU/Linux

I well remember if you took a computer on line at work, you were fired!

 

Share this post


Link to post
Share on other sites
6 minutes ago, Broken Club said:

Thanks XR, I looked for the patch. Can't find it .

What patch are you referring to? The MS update?

Share this post


Link to post
Share on other sites

Not that I know of, it should have come down in the March updates. I'll look when I get back to work. I'm at lunch with my lovely wife!

 

Share this post


Link to post
Share on other sites

The patch was released in March, namely Microsoft Security Bulletin MS17-010, which addresses the vulnerability that these attacks are exploiting. Basically, you can get your computer patched up through either Windows Update or install manually through Microsoft Update Catalog. Microsoft also made an exception and released security patches for their legacy operating systems such as Windows XP, Vista, and Windows Server 2003. You can find all individual patches and download them from Microsoft Update Catalog website.

If you have Windows Update set up to install updates automatically, your computer is most likely already patched up. But how do I now if that’s the case?

You can go to “View update history” in Windows Update in Control Panel to find out. Here are the list of KB numbers for this patch on various Windows systems.

  • Windows Vista & Windows Server 2008: KB4012598
  • Windows 7 Windows Server 2008 R2: KB4012212 (Security Only) or KB4012215 (Monthly Rollup)
  • Windows 8.1: KB4012213 (Security Only) or KB4012216 (Monthly Rollup)
  • Windows Server 2012: KB4012214 (Security Only) or KB4012217 (Monthly Rollup)
  • Windows Server 2012 R2: KB4012213 (Security Only) or KB4012216 (Monthly Rollup)
  • Windows 10
    • First release: KB4012606
    • Version 1511: KB4013198
    • Version 1607: KB4013429
  • Windows 2016: KB4013429

SOURCE

Share this post


Link to post
Share on other sites

You bet, anytime.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


  • Recently Browsing   0 members

    No registered users viewing this page.

×