
WannaCry ransomware hit Windows 7 the hardest
Just 15 per cent of infected PCs were running Windows XP

WANNACRY RANSOMWARE hit Windows 7 PCs the hardest, a security firm has revealed, largely because Microsoft's ageing Windows XP OS is too old to handle it.
In a survey for Reuters, BitSight found that 67 per cent of infected PCs it infected were running Windows 7, despite the OS being installed on fewer than half of Windows PCs worldwide.
Paul Pratley, of UK consulting firm MWR InfoSecurity, told Reuters that WannaCry's ability to infect other computers on the same network without human intervention appeared to be tailored to Windows 7.
Other versions of Windows were not as vulnerable, although not always for the right reasons. Windows 10 represented 15 per cent of infections, while Windows 8, 8.1, Vista and XP made up the remainder.
Windows XP, which is used across the NHS and other organisations, played a much smaller role in the spread of WannaCry than initially thought, because the system crashes before the virus can replicate. Individual computers were vulnerable to the worm component, said researchers at MWR and Kryptos, but could not spread the ransomware themselves.
More modern operating systems - those currently being supported by Microsoft - were able to download a critical security patch released on the 14 March, immunising their computers against WannaCry. However, many users failed to do so.
A security expert, who preferred not to be named, told the INQUIRER: "While we...would always recommend that patching be an integral part of your security, the reasons why IT departments occasionally fall short is because it is rarely a simple exercise... Most have heterogeneous IT environments with critical applications; they cannot roll out a patch until they have tested it to make sure that there are no unforeseen side effects."
Despite its relative ineffectiveness in spreading WannaCry, Windows XP was the subject of a free patch from Microsoft on the 12 May to protect the system. Free support for XP was ended in April 2014; the release of a non-paid patch shows how seriously WannaCry was being treated by the company.
Malwarebytes tracked the WannaCry infection across the globe as it happened - from the first reported case in Russia on Thursday evening, to an explosion of infections less than 12 hours later. The threat was not brought under control until 8pm on Friday, when the rate of spread began to slow. µ
INQ Latest
Google Updates: Bye-bye Fit for web, no more forced arbitration and I/O ballot open
It's the week in Google
O2 has plans for 5G in four UK cities this year
You can probably guess which
Nvidia's GTX 1660 Ti brings Turing power to gamers on a budget
GPU is available in Blighty now for £260
Microsoft might bring Xbox Games Pass to the Nintendo Switch
Move could bring Halo and Gears of War to the hybrid console