Airports, ATMs, hospitals: Microsoft Windows XP leak would be less of an issue, if so many didn’t use it
The source code of the Windows XP operating system is now circulating online as a huge 43GB mega-dump.
Although the software is nearly two decades old, it’s still used by people, businesses and organisations around the world. This source code leak leaves it open to being scoured for bugs and weaknesses hackers can exploit.
The leaked torrent files, published on the bulletin board website 4chan, include the source code for Windows XP Service Pack 1, Windows Server 2003, MS DOS 3.30, MS DOS 6.0, Windows 2000, Windows CE 3, Windows CE 4, Windows CE 5, Windows Embedded 7, Windows Embedded CE, Windows NT 3.5 and Windows NT 4.
The leak came with files containing bizarre misinformation related to Microsoft founder Bill Gates and various conspiracy theories. This is consistent with past leaks from 4chan, a site often associated with extremist content and internet trolls.
Using the name “billgates3”, the leaker reportedly said:
I created this torrent for the community, as I believe information should be free and available to everyone and hoarding information for oneself and keeping it secret is an evil act in my opinion.
If the leak is genuine, this won’t be the first time a Microsoft operating system source code was released online. At least 1GB of Windows 10 source code was leaked a few years ago, too.
Vulnerabilities in the source code
The source code is the “source” of a program. It’s essentially the list of instructions a computer programmer writes when they develop a program, which can then be understood by other programmers.
A leaked source code can make it easier for cyber criminals to find and exploit weaknesses and serious security flaws (such as bugs) in a program. It also makes it easier for them to craft malware (software designed to cause harm).
One example would be “rogue” security software trying to make you think your computer is infected by a virus and prompting you to download, or buy, a product to “remove” it. Instead, the download or purchase introduces a virus to your computer.
According to a report from computer security company F-Secure, on average it takes about 20 minutes for a Windows XP machine to be hacked once it’s connected to the internet.
Is Windows XP still supported?
Windows XP hasn’t had “official” support from Microsoft since 2014. This means there are currently no security updates or technical support options available for users of the operating system.
However, until as recently as last year, Microsoft continued to release security fixes and virus preventive measures for it.
The most notable was an emergency patch released in 2017, to prevent another incident like the massive WannaCry ransomware attack from happening again. This malware affected 75,000 computers in 99 countries – impacting hospitals, Telefonica, FedEx and other major businesses.
In 2016, the network which runs the Royal Melbourne Hospital, Melbourne Health, was infected with a virus targeting computers using Windows XP. The attack forced staff to temporarily manually process blood, tissue and urine samples.
Online, users have posted photos of Windows XP being used at places such as Singapore’s Changi Airport, Heathrow Airport and Zeventem Brussels Airport.
Although the exact figure isn’t known, one estimate suggests the operating system was running on 1.26% of all laptops and desktops, as of last month.
Is there still incentive for hackers to target Windows XP?
The availability of the Windows XP source code opens access for cyber criminals to search for “zero-day threats” in the code that could be exploited.
These are discovered flaws in software, hardware or firmware that are unknown to the parties responsible for patching or “fixing” them – in this case, Microsoft.
Zero-day threats are often found in older ATM machines, for example, as these can’t be patch-managed remotely. This is because they have an embedded version of Windows XP with limited connectivity.
To upgrade in such cases, a bank’s IT professionals would have to visit the machines one by one, branch by branch, to apply security patches for the embedded systems. One report suggests hackers can break through the defences and security features of these older style ATMs within 10-15 minutes.
There’s no easy way to confirm whether ATMs in Australia are still running this 19-year-old software, but past reports indicate this could be the case. The Conversation has reached out to certain parties to obtain this information and is awaiting a response.