Read upgrade to Windows 10 for free. How to Install MS17-010 (KB4012212) Security Update on Windows 7. Download the MS17-010 (KB4012212) update package 32-bit| 64-bit; Download the update package according to the operating system you are using, that is 32-bit or 64-bit. After downloading the update package, double click it to open an install.
MICROSOFT was forced to act quickly after more than 200,000 computers around the world were subject to a massive cyber attack.
It came amid concerns networks were left vulnerable because they were still using outdated Windows XP software.
What is Microsoft's MS17-010 Windows patch?
Microsoft released a critical security patch update for Windows XP, Server 2003 and Windows 8 after systems were infected by ransomware, known as WannaCry, on May 12.
WannaCrypt - an earlier version of the malware - used previously leaked tools by the US's National Security Agency to exploit vulnerabilities in the Windows platform.
Microsoft patched the vulnerability using MS17-010 in March - but only for current platforms.
Therefore those running older systems, such as Windows XP, Windows 8 and Server 2003 weren't provided with a fix.
After the international attack, Microsoft changed its stance on 'end-of-life' patching and provided a mass fix, according to CSO Online.
The WannaCry ransomware affected more than 200,000 victims, including a fifth of the NHS trusts as well as other major global businesses.
How can you protect your PC from Wannacry ransomware?
Microsoft has urged anyone who hasn't already updated their system with the security update to do so immediately.
Individuals should also install any other software updates and switch on auto-updaters where possible.
Microsoft also recommends running its free anti-virus software for Windows.
Marcus Hutchins, 22, from Devon, has been hailed an “accidental hero” after he managed to stop the virus in its tracks by triggering a “kill switch”.
But there are other steps you should be taking to ensure you keep your information protected. These include:
- Ensuring you regularly back up your files by regularly saving copies in a completely separate system, such as an external hard drive.
- Never click on links you don't recognise or download files from people you don't know or trust.
- Install an anti-virus software and check for regular security updates.
Revealed
BAD APPLE
iPhone owners warned NOT to install latest update as it 'could get you hacked'Revealed
TEXT BEST THING
Genius WhatsApp trick changes your font – and your pals will be confusedPictured
DEAD STRANGE
Mystery of 'skeleton lake' where hundreds of people died over 1,000 yearsRevealed
BOX FRESH
Leaked 'PS5' sketch reveals Sony's bizarre V-shaped console designINCOMING!
Horror simulation shows 1,200-foot 'God of Chaos' asteroid hitting EarthROCKING THE BOAT
Loch Ness monster may be REAL as scientist reveals new 'plausible theory'Following the massive Wana Decrypt0r ransomware outbreak from yesterday afternoon, Microsoft has released an out-of-bound patch for older operating systems to protect them against Wana Decrypt0r's self-spreading mechanism.
Download Windows 7 Home Premium
The operating systems are Windows XP, Windows 8, and Windows Server 2003. These are old operating systems that Microsoft stopped supporting years before and did not receive a fix for the SMBv1 exploit that the Wana Decrypt0r ransomware used yesterday as a self-spreading mechanism.
Ms17-010 Patch Download
That mechanism is a modified version of the ETERNALBLUE exploit, an alleged NSA hacking tool leaked last month by a group known as The Shadow Brokers.
Original MS17-010 patch didn't include XP/Win8 fixes
Microsoft had released a fix for that exploit a month before, in March, in security bulletin MS17-010. That security bulletin only included fixes for Windows Vista, Windows 7, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2012, and Windows Server 2016.
As the SMBv1 is a protocol that comes built-in with all Windows versions, the computers which did not receive MS17-010 remained vulnerable to exploitation via Wana Decrypt0r's self-spreading package.
'Given the potential impact to customers and their businesses, we made the decision to make the Security Update for platforms in custom support only, Windows XP, Windows 8, and Windows Server 2003, broadly available for download,' Microsoft said in a statement. 'This decision was made based on an assessment of this situation, with the principle of protecting our customer ecosystem overall, firmly in mind.'
Researchers believe that Wana Decrypt0r — also referenced online as WCry, WannaCry, WannaCrypt, and WanaCrypt0r — infected over 141,000 computers.
While unconfirmed, many believe older Windows XP and Windows Server versions were the bulk of the infections pool, as they had no way to protect themselves.
Patch systems and disable SMBv1 where possible
Windows Update Ms17 010 Download
Besides installing these out-of-band updates — available for download from here — Microsoft also advises companies and users to disable the SMBv1 protocol, as it's an old and outdated protocol, already superseded by newer versions, such as SMBv2 and SMBv3.
The current Wana Decrypt0r outbreak has been stopped last night after a security researcher found a kill switch. This is only temporary, as the attackers could release a new version of this threat. This is why patching the SMBv1 exploit is a better solution.
Blizzard warcraft 3 frozen throne update. For those affected, you can discuss this ransomware and receive support in the dedicated WanaCrypt0r & Wana Decrypt0r Help & Support Topic. Bleeping Computer also published a technical analysis of the Wana Decrypt0r ransomware.