Microsoft patches Windows 8 and Windows XP to prevent from Wannacry Ransomware, Here is how to check if you are safe
From the last few days the cyber world is infected by wannacry Ransom ware, which derailed many systems across the world. Although the ransom infection is stopped now, but it concerns many people that if they are safe from it. Because of a large number of users running un-patched OS, this became widespread.
Here are some must know facts about Wannacry Ransom:
- It crippled up many systems throughout the world for example NHS in Britain. But no more infections as it has been patched(might be temporary)
- Microsoft released patches in March for its OSes which are still supported to fix the vulnerability.
Microsoft seeing the extent of the damage, surprisingly patched its products which are no longer supported as well like Windows 8 and Windows XP. If the vunerability in your system is fixed, then you are safe. Microsoft has also updated Windows defender with latest definitions. Here is an OS by OS guide that what you need to do:
Windows 10 v1703
Windows 10 v1703 is already patched by MS017-010 vunerability. No need to do anything.
Windows 10 v1607
For Windows 10 v1607. The update that jumps build number to 14393.953 patches the vunerability. As said, it was released in March. If you are 14393.953 or higher and with latest definitions of defender then you are safe.
Windows 10 v1511
For Windows 10 v1511. The update that jumps build number to 10586.839 patches the vunerability. As said, it was released in March. If you are 10586.839 or higher and with latest definitions of defender you are safe.
Windows 10 v1507
For Windows 10 v1507. 10240.17139 patches the vulnerability.
Windows 8.1
If any of the following patches are installed in Control Panel>Windows update>See installed updates, you are safe.
- 2017-05 Security Monthly Quality Rollup for Windows 8.1 (KB4019215)
- April, 2017 Preview of Monthly Quality Rollup for Windows 8.1 (KB4015553)
- April, 2017 Security Monthly Quality Rollup for Windows 8.1 (KB4015550)
- March, 2017 Security Monthly Quality Rollup for Windows 8.1 (KB4012216)
- March, 2017 Security Only Quality Update for Windows 7 (KB4012213)
If any of these is not installed, download the appropriate package 32-bit or 64-bit.
Windows 7
If any of the following patches are installed in Control Panel>Windows update>See installed updates, you are safe.
- 2017-05 Security Monthly Quality Rollup for Windows 7 (KB4019264)
- April, 2017 Preview of Monthly Quality Rollup for Windows 7 (KB4015552)
- April, 2017 Security Monthly Quality Rollup for Windows 7 (KB4015549)
- March, 2017 Security Monthly Quality Rollup for Windows 7 (KB4012215)
- March, 2017 Security Only Quality Update for Windows 7 (KB4012212)
If not, download the package accordingly 32-bit or 64-bit and you are safe.
Windows Vista
Windows Vista requires Security Update KB4012598 to be installed. See the control panel>Installed updates for the same.
Windows 8 and Windows XP
Microsoft seeing the extent of the attacks, also patched their no longer supported products. The links of the patches are given at the bottom of the article( Further links) here.
Though the vulnerability has already been fixed, it is a good practice not to open any suspicious emails. Emails containing attachments are the most general sources of Ransomware.
Though the vulnerability has already been fixed, it is a good practice not to open any suspicious emails. Emails containing attachments are the most general sources of Ransomware.
You can read more information about MS17-010 bulletin here in this article as well.
Thanks to woody for the links