Microsoft usually expelled a patch for Windows XP that fixes a record pity smirch being exploited by a WannaCry ransomware. Here’s how to implement it.
You can download some versions of a patch regulating links during a bottom of this May 12th Microsoft article: Customer Guidance for WannaCrypt attacks. The full list of patch variants, including languages other than English, is in a Windows Catalog, usually search for KB4012598. Windows Update does not work on XP.
For an x86 appurtenance with Service Pack 3 installed, a downloaded record name is
I know, a looks like malware itself. The record is small, usually 665K. Logon as an Administrator and, for good luck, make a Restore Point initial thing.
To see if System Restore is enabled, right click on My Computer, get a Properties and go to a System Restore tab. To indeed make a Restore Point, go to Start – Programs – Accessories – System Tools – System Restore.
The designation routine is simple.
1. Wizard warns we to backup your complement and tighten all open programs
2. Then we have to determine to a permit
3. Installing a patch takes usually a few seconds, even on aged hardware. It initial asks we to wait while it “inspects your stream configuration, repository your stream files and updates your files.” Then it creates a revive point.
4. When a all done, it wants we to reboot
After rebooting, we can determine that a patch was rightly commissioned regulating Add or Remove Programs in a Control Panel. You initial need to spin on a checkbox to “Show updates.” Then corkscrew down looking for a “Windows XP – Software updates” section. It should be huge.
In this section, demeanour for “Security Update for Windows XP (KB4012598)” with a stream date as a date installed. Considering this is Windows XP, a designation date should hang out like a bruise thumb. On dual machines that we tested, it was, fortunately, a final entrance in a list.
The repair relates to a record pity member of Windows (Server Message Block or SMB) and so prevents an XP appurtenance from being infected over a LAN (Local Area Network). However, it would not protect an XP appurtenance that was pounded another way, around email, for example.
I checked around (here and here) and Microsoft has not expelled an refurbish to their giveaway anti-malware software, Security Essentials, for Windows XP. When XP went off support, it was denied entrance to Security Essentials. Thus, XP machines sojourn vulnerable to WannaCry, usually not around record pity on a LAN.
To fully strengthen an XP appurtenance requires a third celebration antivirus product. Lotsa fitness with that.
BitDefender bragged today that they can strengthen opposite WannaCry, though they do not support Windows XP. Neither does Avira, Trend Micro or F-Secure. Kaspersky still supports XP, though their website says zero about WannaCry.
So, yes, Microsoft expelled a patch for Windows XP. But now we know a rest of a story.
Get in hold with me secretly by email during my full name during Gmail. Public comments can be destined to me on chatter during @defensivecomput