Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

7/21/2017
10:42 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Speed of Windows 10 Adoption Not Affected by WannaCry

WannaCry has motivated security teams to stay current on patching but Windows 10 adoption remains the same.

WannaCry hasn't prompted faster Windows 10 deployment among most businesses, new data shows: just 13% of firms have accelerated their upgrade processes after the massive ransomware outbreak hit machines worldwide in May.

This finding comes from 1E, which polled 400 US-based IT professionals to learn about their experiences and responses to WannaCry. At the time of their survey, only 11% of respondents had completed their Windows 10 migrations. More than half (53%) had their migration underway, 18% were planning to begin migration this year, and 10% plan to migrate next year. Eight percent have no migration plan.

However, only 13% of respondents are accelerating Windows 10 deployment as a direct result of the attack. Stuart Okin, senior vice president of product at 1E, says this isn't a surprise given the burden of upgrading systems, especially at bigger organizations.

A Windows 10 upgrade can affect "hundreds of thousands of pieces of software," he explains. Some may be compatible with Windows 10, some may not be compatible. IT teams are concerned with disrupting operations and knocking out drivers by upgrading their systems.

Most businesses were not ready to defend against WannaCry, with 86% taking preventative measures after they heard about the attack. This is "a huge amount of activity" for a virus exploiting a vulnerability patched months prior, claims 1E, which found ten percent of respondents were infected in the outbreak.

Significantly, 86% was the same percentage of businesses reporting they do not immediately release patches to endpoints when they become available. After learning about WannaCry, most respondents' first preventative step was learning whether they were vulnerable.

"At the very least, they were finding out whether their systems and software were utilizing the vulnerable protocol and getting a handle on that," explains Okin. "86% weren't sure where they stood and had to take actions on a protocol that was first conceived in 1990 but hadn't really been used from 2006 onwards."

The protocol he refers to is Server Message Block (SMB) version 1, an old protocol used to send files between Windows machines. Once one computer was infected with WannaCry, it invoked a flaw in SMB to infect other vulnerable machines on the network. Even if companies had disabled SMB, they still may not have applied the patched Microsoft issued ahead of WannaCry.

Digging into the numbers, it's clear most companies wait to release patches. Only 14% deploy patches immediately, 36% deploy within one week of the patch's release, and 23% wait at least four weeks after the patch is released.

WannaCry has sparked increased security awareness among businesses, with 71% reporting greater intent to stay current with updates. Nearly three-quarters think the experience of reacting to WannaCry has prepared them to address future threats.

Okin says it's important to adopt new versions of Windows as Microsoft rolls out security updates to mitigate vulnerabilities. Automation can accelerate the process of updating operating systems and testing applications. IT often chooses slower manual testing processes, but Okin says it's time change this mindset with the new Windows upgrade structure.

With vulnerabilities publicly available, he anticipates the malware trend will continue to grow until organizations change their mindsets and commit to constant operating system updates.

"Everybody in this industry knows where the vulnerabilities are - they're published, at least a good chunk of them," says Okin. "How to exploit those vulnerabilities is also published, and that's without actually going into the underground."

However, he continues, security teams need to understand they may still be attacked even if their patches are up to date. Take the NotPetya attack, which targeted global machines a few weeks after WannaCry hit. The second outbreak took entire businesses offline and was able to move across all machines, not only those using older protocols.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NishantG025
50%
50%
NishantG025,
User Rank: Apprentice
7/22/2017 | 3:23:08 AM
Wonderful post
Nice and very wonderful content, Nice to see such innovative websites. these are wonderful to explore. Deep thanks to the author, Greeting from  codesgen.com
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14994
PUBLISHED: 2019-09-19
The Customer Context Filter in Atlassian Jira Service Desk Server and Jira Service Desk Data Center before version 3.9.16, from version 3.10.0 before version 3.16.8, from version 4.0.0 before version 4.1.3, from version 4.2.0 before version 4.2.5, from version 4.3.0 before version 4.3.4, and version...
CVE-2019-15000
PUBLISHED: 2019-09-19
The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6....
CVE-2019-15001
PUBLISHED: 2019-09-19
The Jira Importers Plugin in Atlassian Jira Server and Data Cente from version with 7.0.10 before 7.6.16, from 7.7.0 before 7.13.8, from 8.1.0 before 8.1.3, from 8.2.0 before 8.2.5, from 8.3.0 before 8.3.4 and from 8.4.0 before 8.4.1 allows remote attackers with Administrator permissions to gain rem...
CVE-2019-16398
PUBLISHED: 2019-09-19
On Keeper K5 20.1.0.25 and 20.1.0.63 devices, remote code execution can occur by inserting an SD card containing a file named zskj_script_run.sh that executes a reverse shell.
CVE-2019-11779
PUBLISHED: 2019-09-19
In Eclipse Mosquitto 1.5.0 to 1.6.5 inclusive, if a malicious MQTT client sends a SUBSCRIBE packet containing a topic that consists of approximately 65400 or more '/' characters, i.e. the topic hierarchy separator, then a stack overflow will occur.