{"id":7552,"date":"2014-05-12T07:30:36","date_gmt":"2014-05-12T11:30:36","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=7552"},"modified":"2014-05-12T07:30:36","modified_gmt":"2014-05-12T11:30:36","slug":"hackers-will-use-patches-for-newer-windows-versions-to-exploit-windows-xp","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/hackers-will-use-patches-for-newer-windows-versions-to-exploit-windows-xp\/","title":{"rendered":"Hackers Will Use Patches For Newer Windows Versions to Exploit Windows XP"},"content":{"rendered":"<header style=\"color: #302c22;\">\n<blockquote>\n<h1 class=\"entry-title\" style=\"font-style: inherit;\">Hackers now crave patches, and Microsoft&#8217;s giving them just what they want<\/h1>\n<h2 class=\"entry-summary\" style=\"font-weight: 400; font-style: italic;\">At least one of next Tuesday&#8217;s updates looks like an excellent candidate to hackers as they sniff for bugs in the now-retired Windows XP<\/h2>\n<\/blockquote>\n<\/header>\n<section style=\"color: #302c22;\">\n<div class=\"entry-content\" style=\"font-weight: inherit; font-style: inherit;\">\n<div style=\"font-weight: inherit; font-style: inherit;\">\n<div id=\"article_body\" style=\"font-weight: inherit; font-style: inherit;\">\n<blockquote>\n<p id=\"first_paragraph\" style=\"font-weight: inherit; font-style: inherit;\"><span class=\"source\" style=\"font-weight: inherit; font-style: inherit;\">Computerworld &#8211;<\/span>\u00a0Hackers will have at least one, perhaps as many as four, patches next week to investigate as they search for unfixed flaws in Windows XP, the 13-year-old operating system that Microsoft retired from support April 8.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">&#8220;Come Tuesday, Microsoft will be patching some vulnerabilities in Windows, and it is realistic to assume that at least one of these will also affect Windows XP,&#8221; said Kasper Lindgaard, director of research and security at Secunia, in an email Friday. &#8220;Generally speaking, newly discovered vulnerabilities in XP will be unpatchable for private users, and therefore we will see a rise in attacks.&#8221;<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">On May 13, Microsoft&#8217;s regularly-scheduled monthly Patch Tuesday, the Redmond, Wash. company will issue\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #990000;\" href=\"http:\/\/www.computerworld.com\/s\/article\/9248207\/Tick_tock_Windows_8.1_users_face_patch_ban_as_Microsoft_sets_next_week_s_updates\">eight security updates<\/a>\u00a0for its software. But because it has stopped providing updates to owners of Windows XP PCs, those customers will not see any of the eight.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">Hackers looking for vulnerabilities in Windows XP will be using the patches to find vulnerabilities in XP, Microsoft and security experts have said. By conducting before- and after-patch code comparisons, attackers may be able to figure out where a vulnerability lies in Windows 7 &#8212; which\u00a0<i style=\"font-weight: inherit;\">will<\/i>\u00a0be patched &#8212; then sniff around the same part of XP&#8217;s code until they discover the bug there. From that point, it will be relatively straight forward for them to craft an exploit and use it against unprotected XP PCs.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">&#8220;Patches to the other Windows operating systems will be reverse engineered by hackers, seeking to discover which vulnerabilities were fixed by Microsoft, and if applicable, modified to work against Windows XP,&#8221; Lindgaard said.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">He&#8217;s not the only one who believes hackers will leverage updates to find unpatched bugs in XP. So does Microsoft.<\/p>\n<p style=\"font-weight: inherit; font-style: inherit;\">&#8220;After April [2014], when we release monthly security updates for supported versions of Windows, attackers will try and reverse engineer them to identify any vulnerabilities that also exist in Windows XP,&#8221; said Dustin Childs, director of Microsoft&#8217;s Trustworthy Computing group,\u00a0<a style=\"font-weight: inherit; font-style: inherit; color: #990000;\" href=\"http:\/\/www.computerworld.com\/s\/article\/9243660\/Windows_XP_infection_rate_may_jump_66_after_patches_end_in_April\">last October<\/a>. &#8220;If they succeed, attackers will have the capability to develop exploit code to take advantage of them.&#8221;<\/p>\n<\/blockquote>\n<h4 style=\"font-weight: inherit; font-style: inherit;\"><span style=\"text-decoration: underline;\"><a href=\"http:\/\/www.computerworld.com\/s\/article\/9248265\/Hackers_now_crave_patches_and_Microsoft_s_giving_them_just_what_they_want\" target=\"_blank\"><strong>SOURCE: COMPUTERWORD<\/strong><\/a><\/span><\/h4>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Hackers now crave patches, and Microsoft&#8217;s giving them just what they want At least one of next Tuesday&#8217;s updates looks like an excellent candidate to hackers as they sniff for bugs in the now-retired Windows XP Computerworld &#8211;\u00a0Hackers will have at least one, perhaps as many as four, patches next week to investigate as they search for unfixed\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/hackers-will-use-patches-for-newer-windows-versions-to-exploit-windows-xp\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1426,10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7552"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=7552"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7552\/revisions"}],"predecessor-version":[{"id":7553,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7552\/revisions\/7553"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=7552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=7552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=7552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}