{"id":14955,"date":"2014-05-26T16:20:44","date_gmt":"2014-05-26T16:20:44","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1914"},"modified":"2020-02-26T10:50:49","modified_gmt":"2020-02-26T15:50:49","slug":"windows-xp-bad-things-live-on","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/windows-xp-bad-things-live-on\/14955\/","title":{"rendered":"Windows XP: bad things live on?"},"content":{"rendered":"<p>Earlier this month, I have spent a week in Protaras, a very nice resort town located at the Eastern part of Cyprus. It\u2019s a brilliant place for a getaway especially when you are in need of one. I came a bit ahead of the season, so there were less people in the streets and on the beaches than one may expect.<\/p>\n<p>At first glance, Protaras almost entirely consists of hotels, villas-for-hire and countless pubs, cafes and tourists\u2019 emporiums that are open late into the night. This busy life, however, coexists with empty, under constructed or outright abandoned venues and hotels, which would make one think that Protaras is experiencing some issues. Again, it was just the second week of May, and, according to local workers, the main influx has yet to happen. Still it looks as though Protaras once knew better times than now.<\/p>\n<p>One day while doing some shopping I noticed a peculiar sound, that a cash register had a strikingly familiar chime of Windows XP. My inquiries were left unsatisfied: the girl behind the stand didn\u2019t know whether the register really used Windows XP or not. Actually, from what I saw on a display, the cash, touch-sensitive interface was indeed Windows-based.<\/p>\n<p>Well, using XP isn\u2019t relevant any longer given that Microsoft ended its support on April 8th. Moreover, it\u2019s plain dangerous given the amount of malware targeting Windows XP, including its embedded versions which are used on PoS terminals. The fabulous Target and Neiman Marcus breaches exposed credit cards data of millions people are just two examples. Yes, hackers are more likely to attack larger targets \u2013 for now. But the larger retailers\u2019 IT people learn their lessons (even if in a hard way). So bad guys soon will likely switch their attention towards smaller (and much more careless) victims. Probably even as small as these shops for tourists \u2013 even the smaller shops and cafes are visited by hundreds on a daily basis, with lots of people using their credit cards for payment.<\/p>\n<p>Even though Windows XP support is expired and this aged OS\u2019s insecurity is widely publicized now, still it is in active use. Just last year more than 90% of ATMs in the United States have been equipped with XP derivatives, and so are lots of Points-of-Sale. Actually, if we take a look <a href=\"http:\/\/www.microsoft.com\/windowsembedded\/en-us\/product-lifecycles.aspx\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a> we would see that late in 2008 Microsoft released Windows Embedded POSReady 2009, which is \u2018a fancy version\u2019 of Windows XP. This <a href=\"http:\/\/www.youtube.com\/watch?v=cdo5Sz-wO4s\" target=\"_blank\" rel=\"noopener nofollow\">video<\/a> shows how its \u2018relationship\u2019 to XP can be exploited.<\/p>\n<p>However, it barely comes as a surprise that businesses still use XP or its derivatives. First, there comes the common logic: as long as stuff works, it can be used.<\/p>\n<p>Second, Microsoft ceased support of Windows XP less than two months ago. And although the warnings were given way ahead of time, migration has been going (and still is) on at a much slower pace than it should do. Larger entities consider costs, smaller ones expect to stay \u201cinvisible by size\u201d \u2013 like \u201cwe\u2019re too small to be hacked,\u201d which is wishful thinking at best.<\/p>\n<p>By the way, the aforementioned Windows Embedded POSReady 2009 will be supported onwards until 2019 \u2013 which would probably discourage its users from deploying something more secure for quite some time.<\/p>\n<p>Using Windows XP is a risk today because hackers apparently will look and find new, yet unknown vulnerabilities in order to reach for other people\u2019s money.<\/p>\n<p>Which, by the way, may be much easier than one would think. As we talked about our vacancies with colleagues, one of them told me about another interesting \u201cresort case\u201d. He visited Dominicana and in a hotel lobby there were two public PCs with internet access and packed with <i>lots <\/i>of software. Guess the OS installed? Windows XP, right. Now the high spot: people there didn\u2019t mind using these PCs for their banking operations.<\/p>\n<p>And then these people expect that banks will compensate their losses as soon as there are any. Sometimes you start asking yourself, whether banks should do it at all? Or is there a way to prevent people from doing stupid things?<\/p>\n<p>One final note- There is a possibility to protect banks and payment services, along with their\u00a0 clients, from some problems \u2013 from fraud, namely. Late last winter, Kaspersky Lab has rolled out Kaspersky Fraud Prevention platform, which we <a href=\"https:\/\/business.kaspersky.com\/kaspersky-fraud-prevention\/\" target=\"_blank\" rel=\"noopener nofollow\">described back in February<\/a>. It includes client software protecting transactions on various devices, server solutions that detect fraudulent transactions at the stage of electronic payment processing and several additional services. Its Clientless Engine, in turn, is capable of preventing fraudulent transaction even if end users don\u2019t have any security solution installed on their devices and use some very old and quite insecure operating systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this month, I have spent a week in Protaras, a very nice resort town located at the Eastern part of Cyprus. It\u2019s a brilliant place for a getaway especially<\/p>\n","protected":false},"author":209,"featured_media":16147,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[600],"class_list":{"0":"post-14955","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-windows-xp"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/windows-xp-bad-things-live-on\/14955\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/windows-xp-bad-things-live-on\/14955\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/windows-xp-bad-things-live-on\/14955\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/windows-xp\/","name":"Windows XP"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14955","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14955"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14955\/revisions"}],"predecessor-version":[{"id":33149,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14955\/revisions\/33149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16147"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}