Security

Post WannaCry Ransomware, Microsoft Updates Additional Patches For Its Operating System

Microsoft just nailed another internet problem. Last month it overcame the NSA cyber weapon-powered WannaCry ransomware problem. Now the company, in order to avoid any other catastrophe, wants to help its users of all its units. For this purpose, it has provided updates for Patch Tuesday to those who can’t receive one. This patch is also being updated to the geriatric Windows XP being used these days.

Microsoft already provided emergency fixes for the OS affected by the WannaCry ransomware. The tech giant had second thoughts about why is it issuing more patches for its operating system after that. Microsoft discussed the detail about these patches being issued in its one of the blog posts that the exposures were “at heightened risk of exploitation due to past nation-state activity and disclosures.”

Also Read: Global ransomware hits 75 countries

In another blog post, it said:

“Due to the elevated risk for destructive cyberattacks at this time, we made the decision to take this action because applying these updates provides further protection against potential attacks with characteristics similar to WannaCrypt”

Though this WannaCry problem turned out to be a motivation for Microsoft, it’s blaming NSA for one of its tools. The company suspects that it was leaked online by a group named Shadow Brokers that WannaCry attackers used to rapidly spread their ransomware. (The NSA is still to accept or reject the authenticity of the file, though it is believed to be true).

Recent similar malwares

Other similar malwares include ransomware UIWIX, cryptocurrency miner Adylkuzz and a cryptic malware named EternalRocks. All these viruses spread by penetrating the same weakness in the Microsoft Windows SMB software.

Microsoft did not provide any further detail about why it is throwing these additional essential patches. An official said:

“The company does feel the potential risk to customers is significant enough to warrant the action they are taking today to provide updates for both supported and unsupported systems”

The company didn’t even discuss the acknowledgement for the WannaCry attacks. Symantec security experts and BAE Systems, above others, claim that a group of hackers related to North Korea is responsible.

In its advisory, Microsoft stated the details on the patches that two of them countering the older pc are being misused vigorously. Trend Micro Zero Day Initiative (ZDI) analyzed the 96 weaknesses that Microsoft stated. According to the analysis, one of them is similar to that exploited by Stuxnet malware. It was specifically used to liquefy Iranian power plants and was claimed to be powered by the U.S and Israeli government.

The other had the power to disrupt any organization hit by it on a large scale. According to ZDI:

“This is just the type of vulnerability favored by malware authors to create widespread chaos”

Following are the systems getting the software updates: Windows XP, Windows Vista, Windows 8, Windows Server 2003 and Windows Server 2003 R2.

Struggling patches

Although Microsoft is expected to receive round of applause for it support to systems, many claim that it could fail.

Alan Woodward, security expert at the University of Surrey claimed that it’s a double edged sword. He further said:

“It’s good that Microsoft is stepping up to prevent older systems being compromised but at same time this can’t continue for older systems as infinitum. No one wants another WannaCry but it could lead to a false sense of security. The move may also show just how powerful the tools somehow stolen by Shadow Brokers could be”

Rumors thrived that NSA had warned Microsoft about Shadow Brokers agency’s hacks release recently this year. The advised Microsoft to develop patches for certain systems to overcome the upcoming expected problem. This decision shoes that the NSA may already know about other potential exploits expected by the suspicious group of hackers.

Woodward added:

“Microsoft clearly believes that what they now know necessitates prompt action. Whether end users know enough to take advantage of these patches is a whole different matter, assuming the systems they have are even capable of being updated by the end users”

“It continues to show how devastating these tools are when they are leaked into the wild. Somehow I don’t think we’ve heard the last of this”

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

To Top