Of course, for home users, if you're still running one of those old operating systems then yes, you should patch immediately -- and follow up with an upgrade to something current. If you're running a vulnerable system and can't install the patch for some reason, Microsoft has two pieces of advice:
Disable SMBv1 with the steps documented at Microsoft Knowledge Base Article 2696547 and as recommended previously.
Consider adding a rule on your router or firewall to block incoming SMB traffic on port 445
An additional blog post explains Microsoft's analysis of how the malware spreads. On newer versions like Windows Vista, 7, 8.1 and 10, the March update tagged MS17-010 addresses the vulnerability it's exploiting (that was revealed earlier this year by "The Shadow Brokers" when they leaked a stolen cache of NSA tools). While it's not confirmed how the initial infections occurred, it's believed the trojan horse was spread by email phishing links that drop the "EternalBlue" exploit released by The Shadow Brokers, as well as the WannaCrypt malware variant. Interestingly, it doesn't even try to attack Windows 10, focusing solely on Windows 7/8 and earlier operating systems that are still vulnerable to the attack.
Posted:
Related Forum: PC General Forum
Source: https://www.engadget.com/2017/05/13/Microsoft-WindowsXP-WannaCrypt-NHS-patch/
"Microsoft patches Windows XP to fight 'WannaCrypt' attacks" :: Login/Create an Account :: 18 comments