If you're running a Windows Server 2003 machine, you have a problem. Your already-vulnerable computer is now at severe risk of being hacked.
That's due to the internet release earlier this month of a batch of updates that paint a bulls-eye on computers running Windows Server 2003, according to security researchers.
“I can teach my mom how to use some of these exploits,” said Jake Williams, founder of Rendition Infosec, a security provider. “They are not very complicated at all.”
Experts are urging affected businesses to upgrade to the latest Windows OSes, which offer security patches that can address the threat.
But some, particularly those in manufacturing and healthcare, cannot because they rely on legacy software that won't run on a modern operating system.
“It’s usually very costly to upgrade,” he said. “And again, the machine is working fine, but control has to be done through Windows Server 2003.”
There may be over 500,000 Windows Server 2003 machines publicly exposed to the internet, according to Shodan, a search engine for devices. But Williams estimates there are many more vulnerable machines running behind company firewalls.
So, for those that can’t, here are some tips to keep your old Windows Server 2003 machine secure.
The spying tools include several Windows-based exploits, or hacking programs, that target the Windows Server Message Block (SMB) protocol, which is used for file-sharing purposes. The exploits work by remotely triggering the OS to execute code, which can be used to install other malware.
Network segmentation and monitoring
Companies saddled with older Windows Server machines can still protect themselves. Williams suggests they go beyond putting vulnerable servers behind a firewall, and use a tactic called network segmentation.
This can involve restricting access to your most critical servers, and ensuring only system admins can control them. “So instead of giving 20,000 people in a company access, you can cut that number down to 20,” Williams said.
Thus, if hackers ever do breach the firewall, they’ll have access to a smaller segment of the corporate network.
Network segmentation also doesn’t cost a lot of money. Enterprise internet routers often contain access control features that can limit which computers can talk to what, Williams said.
Businesses should also consider monitoring the vulnerable servers, or at least the ones carrying critical information. Any unusual data traffic moving through them is probably a sign they’ve been hacked, he said.
Weighing the risks
To keep malicious activity out of vulnerable systems, application whitelisting can also be used, said Jason Leitner, president of Below0Day, an IT security provider.
Whitelisting works by allowing only trusted applications to run on a computer. It’s the opposite approach of antivirus products, which essentially blacklists malicious programs based on known indicators.
Businesses can also create backups of any sensitive data stored in these machines. One malicious threat that’s been growing in recent years has been ransomware. It works by infecting a computer, and encrypting all the data inside. To free the machine, victims have to pay a ransom, usually in bitcoin.
However, even with these safeguards, the best solution to protecting a vulnerable Windows Server system is to upgrade, according to security experts.
Although it might be costly in the short-term, the investment can help businesses avoid a disastrous data breach. Tiago Henriques, CEO of security firm BinaryEdge, encourages businesses to calculate which is higher: “The cost of buying the upgrade or the damage to their brand and their clients if they get hacked?”
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.