Microsoft released an emergency patch to prevent ransomware from attacking

Microsoft has released an emergency patch for Windows versions to prevent further attacks by WannaCry ransomware (Microsoft flagged as Ransom: Win32 / WannaCrypt).

Windows XP, Windows 8, and Windows Server 2003 users can now download patches from Microsoft Update Catalog and are encouraged to update the system as soon as possible, because the number of attacks is increasing.

  1. A massive network attack using leaked NSA vulnerabilities, has affected 99 countries and is still spreading.

The infection from WannaCry was first discovered in Europe yesterday in organizations in many countries, including Britain and Spain. The UK NHS national health agency is seriously affected. At the end of Friday, it also began to spread to the United States.

The infection is based on the Windows vulnerability, which is owned by NSA and leaked this year by Shadow Brokers hacker group. Microsoft explained that Windows versions are still supported, including Windows 7, 8.1 and 10, with the latest updates of the Windows Defender antivirus software absolutely safe.

You can download emergency patches for Windows that are not supported here: Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86, Windows XP SP2 x64, Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86 , Windows 8 x64.

Download Windows updates for all versions: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

In addition to updating the patch from Microsoft, you also need to close port 445 on Windows to ensure safety before WannaCry and WannaCry 2.0 - a much more dangerous variant of WannaCry.

Avoid opening emails from unreliable sources

On the other hand, Windows XP, Windows Server 2008 and Windows 8 are no longer supported . Because it no longer receives the latest Windows updates, Microsoft decided to release an emergency patch.

Picture 1 of Microsoft released an emergency patch to prevent ransomware from attacking

Windows XP no longer receives updates from April 2014

"We know that some customers running these versions of Windows no longer receive major support (mainstrean support). That means they do not receive Security Update security updates released in March. Due to the photos. Due to the attack on customers, we decided to release Security Update for users who did not receive automatic updates (only receive Custom Support), applied to Windows XP, Windows 8 and Windows Server 2003 ". Microsoft said. "This decision is based on an assessment of the situation, with our key principle of protecting the customer ecosystem first".

Microsoft also said the attack uses phishing techniques that include infected files, so users should avoid opening files from untrusted sources.

Update 23 May 2019
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile