Researchers Suggest Windows XP Was Immune To WannaCry Virus

It turns out that devices running Windows XP operating systems weren’t actually as vulnerable to the WannaCry ransomware virus as was first thought, according to research carried out by Kryptos Logic.

Kryptos suggests that, although Windows XP is vulnerable when the WannaCry binary is executed locally on the host, the OS didn’t actually contribute much to the early wave of infections.

This is because the virus was predominantly spread over the network via the MS17-010 SMB vulnerability used by Windows machines.

Windows XP

WannaCry used two types of exploit codes: ETERNALBLUE and DOUBLEPULSAR. Kryptos decided to test the code in four different scenarios: Windows XP with Service Pack 2, Windows XP with Service Pack 3, Windows 7 64 bit with Service Pack 1 and Windows Server 2008 with Service Pack 1.

The researchers found that infection was unsuccessful in both Windows XP scenarios, with the worst outcome being the blue-screen of death (BSOD).

Windows 7 64 bit with Service Pack 1 became infected after multiple attempts and Windows Server 2008 with Service Pack 1 was reported as exploited.

“Since the main infection vector here was the SMB exploit, it seems like XP did not contribute much to the total infection counts,” write the researchers. “To be clear, the Windows XP systems are vulnerable to ETERNALBLUE, but the exploit as implemented in WannaCry does not seem to reliably deploy DOUBLEPULSAR and achieve proper RCE, instead simply hard crashing our test machines.

“The worst case scenario, and likely scenario, is that WannaCry caused many unexplained blue-screen-of-death crashes.”

WannaCry, also known as WannaCrypt, caused havoc earlier this month when it spread like wildfire across the globe, attacking the NHS and hundreds of other organisations before being stopped by a ‘kill switch’ developed by a security researcher.

It has since gone on to hit the Russian postal service and has been linked to a North Korean hacking group by the likes of Symantec and Kaspersky Lab.

Do you know all about security in 2017? Try our quiz!

Sam Pudwell

Sam Pudwell joined Silicon UK as a reporter in December 2016. As well as being the resident Cloud aficionado, he covers areas such as cyber security, government IT and sports technology, with the aim of going to as many events as possible.

Recent Posts

Google Delays Removal Of Third-Party Cookies, Again

For third time Google delays phase-out of third-party Chrome cookies after pushback from industry and…

46 mins ago

Tesla Posts Biggest Revenue Drop Since 2012

Elon Musk firm touts cheaper EV models, as profits slump over 50 percent in the…

2 hours ago

Apple iPhone Q1 Sales In China Fall 19 Percent, Says Counterpoint

Bad news for Tim Cook, as Counterpoint records 19 percent fall in iPhone sales in…

5 hours ago

President Biden Signs TikTok Ban Or Divest Bill Into Law

TikTok pledges to challenge 'unconstitutional' US ban in the courts, after President Joe Biden signs…

7 hours ago

UK CMA Seeks Feedback On Microsoft, Amazon AI Partnerships

British regulator invites feedback on major partnerships Microsoft and Amazon have struck with smaller AI…

23 hours ago

Google Fires More Staff Over Israel Protest

Another 20 staff have been fired by Google over Israel protest and their “completely unacceptable…

1 day ago