Almost All WannaCry Victims Were Running Windows 7 (theverge.com) 123
An anonymous reader quotes a report from The Verge: According to data released today by Kaspersky Lab, roughly 98 percent of the computers affected by the ransomware were running some version of Windows 7, with less than one in a thousand running Windows XP. 2008 R2 Server clients were also hit hard, making up just over 1 percent of infections. Windows 7 is still by far the most common version of Windows, running on roughly four times as many computers as Windows 10 worldwide. Since more recent versions of Windows aren't vulnerable to WannaCry, it makes sense that most of the infections would hit computers running 7. Still, the stark disparity emphasizes how small of a role Windows XP seems to have played in spreading the infection, despite early concerns about the outdated operating system. The new figures also bear on the debate over Microsoft's patching practices, which generated significant criticism in the wake of the attack. Microsoft had released a public patch for Windows 7 months before the attack, but the patch for Windows XP was only released as an emergency measure after the worst of the damage had been done. The patch was available earlier to paying Custom Support customers, but most XP users were left vulnerable, each unpatched computer a potential vector to spread the ransomware further. Still, Kaspersky's figures suggest that unpatched XP devices played a relatively small role in the spread of the ransomware.
Yea, but (Score:2)
Re: (Score:1)
It's inappropriate to spell-check a quotation, you provide it as-is.
Win X Upgrade (Score:5, Insightful)
If MS hadn't tried to force Win10 down Win7 user's throats maybe more would have been installing patches.
Re: Win X Upgrade (Score:5, Insightful)
You've obviously never worked enterprise IT. You don't roll-out new versions of anything until they're thoroughly tested, and sometimes you find that you can't roll-out a new version of some software because other mission-critical software is not compatible with whatever new thing you're trying.
Case in point, all of those ATMs and Point of Sale systems that are still running XP, that Microsoft is still supporting.
Windows 7 has more support for legacy applications than 8/8.1, and Windows 10 has even less support than 8/8.1. If those legacy applications provide the profit or are otherwise of primary importance to the organization then it does not make sense for the organization to change software. The operating system is merely a means to an end, not the end itself.
Re: (Score:1)
You've obviously never worked enterprise IT. You don't roll-out new versions of anything until they're thoroughly tested, and sometimes you find that you can't roll-out a new version of some software because other mission-critical software is not compatible with whatever new thing you're trying.
Case in point, all of those ATMs and Point of Sale systems that are still running XP, that Microsoft is still supporting.
Windows 7 has more support for legacy applications than 8/8.1, and Windows 10 has even less support than 8/8.1. If those legacy applications provide the profit or are otherwise of primary importance to the organization then it does not make sense for the organization to change software. The operating system is merely a means to an end, not the end itself.
I most certainly work in I.T. and do test updates and regularly bring them out. I quit my last job as a result of them hanging on to legacy and broken old processes and servers with no support or rundancy as I did not want to get fired or that write up when ransomware would show up. Hell, we had one mission critical server 2003 EOL with a non working tape backup that we keep using old refurbished units! Gee no potential problem there I mean what could possibly happen?
If you do not roll out reguarly security
Re: (Score:2)
I was talking about remaining on Windows 7, not about patching the installbase of Windows 7 as updates come out. If you're th AC that I replied to, heaven help you.
Re: (Score:2)
I still laugh every time someone calls Microsoft's gaming OS gone wrong "enterprise". Still you have good points, but it has to be handled so carefully because it's a fragile piece of shit used in "enterprise" situations.
Because like everything else the backwards compatibility is fucked in MS Win10.
Re: (Score:2)
You've obviously never worked enterprise IT.
It sounds to me as if you have never worked for Microsoft. Because...
You don't roll-out new versions of anything until they're thoroughly tested...
They do.
Re: Win X Upgrade (Score:4, Insightful)
That is regardless of the fact that the ones that did update were secure.
Tutorial to patch Win7 without adding telemetry? (Score:3)
I'd like to draw on the collective wisdom of my fellow Slashdotters:
If I am one of those people who turned off Win7 updates to avoid being forcibly upgraded to Win10, can anyone recommend a good website that will guide me through updating Win7 to patch the WannaCry flaw, without adding the telemetry or other unwanted pieces of the upgrade?
I am more familiar with Linux but am forced to use Windows at work, but I insist on avoiding Windows n where n>7.
Re: Win X Upgrade (Score:5, Informative)
Microsoft broke Windows Update on Windows 7 soon after the Windows 10 Upgrade windows closed with some botched updates.
Windows 7 computers that didn't take the update were treated with a runaway svchost.exe processes that consumed 100% of a core and near a GB of RAM while halting future updates at the same time. The only way to get performance back was to disable Windows Update. Even reloading Windows 7 from scratch didn't solve the problem. Updates would never come, and svchost.exe was stuck at 100% and massive amounts of memory. Microsoft let this problem linger for months probably in the hopes that users would upgrade to 10. Others here have suggested that it was due to MS not releasing roll-up updates and letting the library grow beyond what Windows Update was able to process. Since the April 2017 security patch Microsoft has begun roll-up updates to solve this problem.
This is 100% Microsoft's fault.
Re: (Score:2)
Wait, are you saying Windows Update is now just as broke on Windows 7 as it always was on 10?
Re: (Score:2)
The update software ended up being seriously broken at some point.
Re: Win X Upgrade (Score:4, Insightful)
Secure from whom? Their data certainly isn't secure from Microsoft anymore.
Re: (Score:2)
monocropping (Score:5, Insightful)
Monocropping leads to viruses whether agricultural or operating systems. Not much more to be said than that other than to point out Intels are the ultimate monocrop and they have a gigantic backdoor called the Management Engine.
In the age of global terrorism, one can expect engineered viruses for agriculture and computers to only increase till something we can't get past comes along. then we'll act in hindsight.
Re: (Score:2)
Re:Pirated versions (Score:5, Insightful)
[Citation required]
Re:Pirated versions (Score:4, Interesting)
What doesn't get reported often enough is that pirated versions of Windows cannot be patched
Actually, yes they can.
and most of the infected computers were running pirated versions.
Alright... you just completely made that up, didn't you?
Re: (Score:2)
I shut off Windows Update last year (Score:1)
So any Microsoft update patching this vulnerability is moot.
Conspiracy Theory (Score:3, Insightful)
Re: (Score:1)
Windows 10 was actually just a ploy to get people so desperate to avoid being forcibly upgraded to Windows 10 that Windows 7 users would disable updates, thereby missing the update that made them immune the the vulnerability used by WannaCry and getting infected with Ransomware, hopefully resulting in them upgrading to Windows 10.
So fiendishly simple...
Re: (Score:2)
MS wanted everybody on Windows 7 to upgrade to Win10 pronto - so they got someone to write Wannacry and release it into the wild. =)
Not convoluted enough. M$ spying information goes straight to the feds, so they leaked this vulnerability to induce people to leave Windows 7 and go to Windows 10 so that they will be vulnerable to spying via telemetry.
I could take it well into fever dream territory but I have better things to do
Windows update flawed? (Score:1)
Supposing you have a machine that's hasn't been offline and not been updated for some time and then you connect to the internet and try to update it. Windows update is so slow and installs the updates in no special order - least important first, so Wannacry is going to get to you before Windows update has a chance to install that patch.
Re:Windows update flawed? (Score:4, Insightful)
Generally you are pwned in that way if you're connecting your PC directly to the internet with no hardware firewall or router which I suspect is pretty rare. Other than setting your router to DMZ mode (which might as well be called "PLEASE HACK ME" mode) as long as you have a router you generally don't get hacked that way. Typically the user has to initiate some action that gets them hacked, though it can be as innocent as opening an e-mail or loading a website they trust. I would say as long as you don't really start to use the internet until your patches are up to date the risk is pretty low.
That said you should keep up with patches in the first place. Windows does it for you and there's usually never a good reason to stop it.
Re: (Score:3, Insightful)
That said you should keep up with patches in the first place. Windows does it for you and there's usually never a good reason to stop it.
Until recently, I'd agree. But how many people turned off updates during the "free" Windows 10 thing? That in it's self damn near felt like there was a virus on your computer. Then there's the telemetry update that got added to Windows 7. Anyone who didn't want that also had to turn off automatic download and install of updates.
Re: (Score:1)
Or even if you are installing a new machine.
Re: (Score:1)
Re: (Score:1)
Supposing you have a machine that's hasn't been offline and not been updated for some time and then you connect to the internet and try to update it. Windows update is so slow and installs the updates in no special order - least important first, so Wannacry is going to get to you before Windows update has a chance to install that patch.
Not if you're behind a router and you don't open any suspicious emails while it's updating. From what I remember reading (I could be wrong), you only get infected from certain open ports or opening infected emails.
Of course... (Score:2)
Re:Of course... (Score:5, Insightful)
Which was all nice and dandy until Microsoft decided to ram Windows 10 down everyones throats. I can fully understand the annoyed users who simply disabled Windows Update because of those nasty practices on the part of Microsoft. Trust is easily lost and hard to regain.
Re: (Score:2)
Re: (Score:2)
Wannacry gets 75% of a 4 core more machine, while Windows Update burns up the remaining 25% perpetually checking for updates...
It is the rare exception to the rule that actually fixed Windows Update on Win 7 machine since the last time around because they broke it literally right before the windows 10 trickery. Most of the people that noticed just disabled the service. Those that fixed the service were then later met with "Roll Ups" instead of patches and thus most of thos
Of Course... (Score:1)
...because turning off windows update was the only way to stop ms from stuffing Windows10, Telemetry and other fuckups down our throat...
AMiGA (Score:1)
Didn't affect my AMiGA.
Here is a possible explanation (Score:5, Interesting)
Windows updates stopped working on my Windows 7 machine about September last year and nothing except for a complete reinstall seems to get it working again - neither Microsoft repair tools, nor 3rd party tools, nothing. It just rolls back every update as failed for almost a year, and I guess I'm not the only one with this problem. So of course the latest patches are not installed.
Re: (Score:1)
I had the same problem and I managed to get it fixed about 2 months ago by following some arcane sequence of actions, involving manually installing some updates with the machine offline and windows updates turned off. Then I had to wait for 3 hours for the whole process to complete.
Re: (Score:3)
Download the following patches and chuck them on a flash key, along with a batch file to disable wuauserv and apply each of them in turn:
kb3138612
kb3145739
kb3164033
kb3020369
kb3172605
kb3168965
Reboot once, then do it again.
I've done this on dozens of Windows 7 machines that were in the apparently eternal search for updates, and all of them got their updates about five minutes after installing the above.
Why not patched? (Score:2)
If a patch was released months ago, why did so many people not install it?
Re: (Score:3, Informative)
If a patch was released months ago, why did so many people not install it?
Re: (Score:2)
Same reasons as always. Lazy and incompetent IT staff at corporations, low knowledge techies that disable Windows Update, long beards who only install certain updates manually after reading the associated KB article and self-determining whether or not they need an update.
This is one of the reasons that Microsoft set Windows Update to be automatic in Windows 10. It makes the OS much safer and generally makes the internet safer as a whole.
Re:Why not patched? (Score:4)
This is one of the reasons that Microsoft set Windows Update to be automatic in Windows 10. It makes the OS much safer and generally makes the internet safer as a whole.
Citation needed. I have seen many Windows updates that cause Windows to completely fail to start. This may mean you need to completely reinstall the OS, which is time-consuming and may leave you open to infection the whole time.
If you have used Windows for any length at all, you are quite familiar with the ritual of "download!" "reboot!" "download some more!" "reboot!" (repeat while cursing, gnashing your teeth, ripping your hair out and wailing).
Re: (Score:2)
You need a citation that security updates make a computer safer?
Re:Why not patched? (Score:4, Insightful)
You need a citation that security updates make a computer safer?
You can prove that there is less virus activity because of Windows 10.
All said, a lot of people turned off Windows 7 updates just because Microsoft loaded Windows 10 on their machines without permission. A lot of people got mysterious blank windows that would install Windows ten with a pretty tenuous definition of "permission".
Microsoft's insidious practice of trying to ram W10 down peoples gullets, with an interface they didn't like and telemetry they didn't want, and update and security they didn't want, and when the best way to avoid the assault on your property was to turn off updates....
Sorry, but a lot of us are of the opinion that Windows 10, rather than make the internet safe, when coupled with Microsoft's heavy handed intrusion on people - set up the situation of both disabling updates, and disabling migration to Windows 10.
Which in turn, helped enable this problem.
Re: (Score:2)
Citation needed. I have seen many Windows updates that cause Windows to completely fail to start.
That's the new Windows model - Security through inoperability.
Re:Why not patched? (Score:5)
Same reasons as always. Lazy and incompetent IT staff at corporations, low knowledge techies that disable Windows Update, long beards who only install certain updates manually after reading the associated KB article and self-determining whether or not they need an update. This is one of the reasons that Microsoft set Windows Update to be automatic in Windows 10. It makes the OS much safer and generally makes the internet safer as a whole.
And if they put in a safe, encased the safe in concrete and dumped it at the bottom of the ocean it'd be even safer. Not very user-friendly though, neither is the force-feeding of random feature updates at inconvenient times. They could have had a category for "Security bulletins and critical updates" that contained only tiny, to-the-point patches for exploits and other big malfunctions, no feature upgrades, no license checks, no trivial extras just the absolute minimum no sane user should disable and 99% of this problem would go away. I'm happy running an OS from 2009. Before that I was running an OS from 2001. I don't need feature updates twice a year and particularly not GUI makeovers.
I realize though that having a zillion combination of patches might be a pain to support, so here's what I'd like to have seen:
1. Microsoft releases version A. You can either stay on stable branch A or get rolling updates A*.
2. After 4 years Microsoft takes the current setup, calls it B. You now have three supported configurations A, B, B*.
3. After 8 years Microsoft takes the current setup, calls it C. You now have four supported configurations A, B, C and C*.
4. After 10 years support for A ends, before that you should migrate to B, C or C*.
From there they'd just bounce between 3-4 supported configurations of N-2, N-1, N and N*.
Most importantly still regardless of when it's updated everything should come with an off switch. I don't mind if Microsoft asks for telemetry. I have a problem with Microsoft demanding telemetry. It's like my car dealer refusing to service the car unless I've kept a log of how I've used it. I could almost live with that if you had to find some obscure setting only 0.01% would turn off. But it's when you deny me that choice this smells really foul. Not that I expect Microsoft to do anything really ugly until most people are on Win10 and can't disable the updates.
Re: (Score:2)
You've never run a heterogenous enterprise setup, with hundreds of vendor systems in it?
Re: (Score:2)
I have some fairly important software on a previous version because very major features are broken by a new patch.
Test then deploy, not just deploy like a trained monkey.
Re: (Score:2)
That's what WSUS is for. It gives you complete control of update installation. You can set up a testing group of machines to apply the updates to, test it, then deploy to the rest of the organisation.
Re: (Score:2)
Re: (Score:2)
Same reasons as always. Lazy and incompetent IT staff at corporations, low knowledge techies that disable Windows Update, long beards who only install certain updates manually after reading the associated KB article and self-determining whether or not they need an update.
This is one of the reasons that Microsoft set Windows Update to be automatic in Windows 10. It makes the OS much safer and generally makes the internet safer as a whole.
Thank you, you can pick up your check tomorrow.
Just don't be so rough on the assholes, they are going to catch on to us.
MS Broke Windows 7 Updates (Score:2)
If the process is broken and there's no notification, then all of these systems are vulner
Re:MS Broke Windows 7 Updates (Score:5, Informative)
Someone wrote an automated tool to install all KB's to fix Windows Update for Win 7:
https://answers.microsoft.com/... [microsoft.com]
Worked on all 3 machines I used it on, in various WU states (endless loop, failing to install).
I had W7 updates turned off. (Score:1)
For 2 reasons:
1. MS pushing telemetry as updates.
2. W7 updates stuck at "Downloading 0%" for hours and hours, then failing.
So now I use wsusoffline every time a periodic "quality and security rollup" is released. It's not as convenient, but it works. I still have to check for telemetry.
P.S. problem # 2 was actually solved by stopping wuauserv, deleting the contents of %windows%\SoftwareDistribution\datastore and %windows%\SoftwareDistribution\downloads, and starting wuauserv again.
Bullshit! (Score:2)
I'll wait for the Linux port. ;)
Re: (Score:2)
Someone demonstrated a proof of concept that infection was possible in Wine.
Class Action Suit in the wings (Score:2)
Re: (Score:2)
Not a clear cut instruction. Is it really SMB1 or SMB2 as the NAME of the entry?
Yes.
Re: (Score:1)
I run OSX. I don't gloat about it because I know it's not magical. Statistically however, it has been a really long run of safety and it's likely the most sensible choice for the future. It's fair to confidently say that you are far safer using macs now and in the foreseable future. But some of that immunity comes from the fact that it's less big of a target.
Re: (Score:2)
Re: (Score:3)
But 90% of douchebags run something other than OSX or Windows.
DOS?
Re: (Score:2)
DOS?
CP/M-86
Re: (Score:2)
Re: (Score:2)