If You Still Use Windows XP, Prepare For the Worst
As a vicious new strain of ransomware swept the UK’s National Health Service yesterday, shutting off services at hospitals and clinics throughout the region, experts cautioned that the best protection was to download a patch Microsoft had issued in March. The only problem? A reported 90 percent of NHS systems run Windows XP, an operating system Microsoft first introduced in 2001, and hasn’t supported since 2014.
NHS has disputed the 90 percent figure—though not that a significant portion of its systems run Windows XP—and was only one example of the tens of thousands of impacted computers across nearly 100 countries yesterday. But its meltdown illustrates the deeper problems inherent in Windows XP’s prevalence three years after its official demise.
Experts rightly that the best protection against the so-called WannaCry ransomware was to patch everything, as soon as possible. But for Windows XP and other expired operating systems, the patches weren’t there in the first place. With very few exceptions—including an emergency patch after the first wave of WannaCry infections—Microsoft no longer provides any security report for the OS. A computer running XP today is a castle with no moat, portcullis raised, doors flung open, greeting the ravaging hoards with wine spritzers and jam.
And it’s only going to get worse.
Hackers have targeted XP for years. Its lack of defenses and persistent popularity make it a popular target. And it really does have a foothold; according to analytics company StatCounter, 5.26 percent of Windows PCs run XP still, while a similar analysis from Net Applications puts the total at just over 7 percent of all personal computers. No matter whose numbers you use, that amounts to tens of millions of devices, and that’s before you count the absurd percentage of ATMs and other non-traditional systems stuck in the past.
The natural question, given the absurd level of risk that comes with running Windows XP in 2017, is why on earth would anyone stick with it, much less millions of people and companies with so much to lose.
The problem stems in part from Windows XP’s initial popularity. “It was one of the first Microsoft operating systems people latched onto,” says Peter Tsai, IT analyst at Spiceworks, a network for IT professionals. Not only was it one of the first stable Windows versions, the five-year gap between Windows XP and its unpopular successor, Windows Vista, resulted in an uncommonly large install base.
You can guess what happened from there; you’ve probably experienced yourself. Business-wide operating system updates take time and money, the kind that fall low on the priority list of a strapped CEO. “A lot of smaller companies subscribe to the theory, probably wrongly now, that if it’s not broken then don’t fix it,” says Tsai. “Especially companies that aren’t prioritizing IT.” Which appears to be most of them; a recent Spiceworks survey found than more than half of businesses worldwide have at least one machine running Windows XP.
Many companies have a more practical excuse than just lethargy; they may rely on specialized legacy software that simply won’t work with newer Windows releases. That may include institutions like NHS, where the process of testing new or updated versions of critical software could disrupt patient care.
But if nothing else, WannaCry makes clear that whatever time and money and disruption companies might think they’re saving by sticking with Windows XP is an illusion. If anything, in recent weeks the threats have only escalated.
Last month, a group of hackers calling themselves Shadow Brokers released a set of purported NSA hacking tools on the internet. They included a previously undisclosed Microsoft vulnerability that targeted older versions of Windows. And it’s that exploit that WannaCry uses to wreak havoc.
This means a few things, none of them encouraging. First, that WannaCry is not a one-off event. There’s a whole suite of NSA tools now available to bad guys, whose interests may range from ransomware to targeted surveillance to building botnet armies and anything in between. Second, since those tools didn’t target Windows 10, any PC not running the latest Microsoft operating system finds itself at much greater risk than it did a month ago. Microsoft confirmed, in fact, that WannaCry didn’t target Windows 10 at all.
By making a rare exception to its hands-off policy toward Windows XP, and issuing a patch that protects older systems (though doesn’t help PCs already infected), Microsoft undoubtedly helped slow the WannaCry spread. But that kind of selective, responsive patching won’t help the first wave of victims of the next big XP vulnerability. It also may give some XP laggards the impression that Microsoft will bail them out in the future, of which there’s no guarantee.
“It can give users a false sense of security, and does not motivate them to upgrade to systems whose security architecture is superior and can be improved on,” says Jérôme Segura, lead malware intelligence analyst at Malwarebytes.
Especially when so many active risks plague XP daily that don’t rise to the level of WannaCry, but can still do harm. “If for some reason they are running Internet Explorer [on XP],” says Segura, “it would only take a few minutes of browsing the net before getting infected via malvertising or a compromised site.”
Maybe, then, the silver lining in WannaCry comes from alerting companies large and small of just how debilitating Windows XP can be. “A decade or two decades ago, most of these malware variants were pretty benign,” says Tsai. “Viruses were just a nuisance, instead of something that could impact the bottom line. But now with ransomware, where they’re encrypting or deleting your critical data, I think that the higher-ups who make decisions are starting to take note.”
If so, hopefully sooner than later. If you don’t want hackers taking shots at you, start by removing the bullseye.
Hackers Remotely Kill a Jeep on the Highway—With Me in It
Published on Jul 21, 2015
Two hackers have developed a tool that can hijack a Jeep over the internet. WIRED senior writer Andy Greenberg takes the SUV for a spin on the highway while the hackers attack it from miles away.