July 26th, 2024

What happens if you connect Windows XP to the Internet in 2024? [video]

The video highlights severe security flaws in Windows XP, demonstrating malware infection within 10 minutes and identifying specific threats like a counterfeit Google program and a Trojan Steeler.

Read original articleLink Icon
What happens if you connect Windows XP to the Internet in 2024? [video]

The video examines the severe internet security deficiencies of Windows XP in contrast to contemporary operating systems. It outlines various vulnerabilities and risks linked to the use of Windows XP. The creator performs an experiment by infecting a Windows XP computer with malware, noting signs of infection within a mere 10 minutes. Throughout the analysis, they uncover suspicious files and processes, indicating the possible presence of malware types such as a stealer, worm, or email spam. Additionally, the video highlights the identification of specific malware on the Windows XP system, including a counterfeit Google program and a Trojan Steeler.

Related

Windows: Insecure by Design

Windows: Insecure by Design

Ongoing security issues in Microsoft Windows include vulnerabilities like CVE-2024-30080 and CVE-2024-30078, criticized for potential remote code execution. Concerns raised about privacy with Recall feature, Windows 11 setup, and OneDrive integration. Advocacy for Linux desktops due to security and privacy frustrations.

Windows: Insecure by Design

Windows: Insecure by Design

The article discusses ongoing security issues with Microsoft Windows, including recent vulnerabilities exploited by a Chinese hacking group, criticism of continuous patch releases, concerns about privacy invasion with Recall feature, and frustrations with Windows 11 practices. It advocates for considering more secure alternatives like Linux.

CrowdStrike CEO is former McAfee CTO; they caused a similar PC meltdown in 2010

CrowdStrike CEO is former McAfee CTO; they caused a similar PC meltdown in 2010

A defective McAfee update caused global issues on Windows XP PCs, leading to reboot loops and network loss. McAfee replaced the faulty update, advising manual repairs. Corporate customers faced challenges, raising concerns about McAfee's quality control. Intel and other large organizations experienced operational disruptions. McAfee released a repair tool, stressing the importance of skilled support.

Defective McAfee update causes worldwide meltdown (2010) of XP PCs

Defective McAfee update causes worldwide meltdown (2010) of XP PCs

A defective McAfee update caused global issues on Windows XP PCs, leading to reboots and network loss. McAfee replaced the faulty update (DAT file version 5958) and provided a manual fix. Corporate customers may switch providers due to the impact. McAfee's quality control is questioned. Repairing affected systems requires skilled professionals due to critical file involvement. McAfee released a repair tool, emphasizing the need for rigorous testing procedures.

Crashes and Competition

Crashes and Competition

The article explores Windows OS design, kernel access impact on security firms, CrowdStrike crash consequences, Microsoft's limitations due to agreements, and regulatory implications for system security and functionality balance.

Link Icon 7 comments
By @usr1106 - 5 months
Interesting topic, but I would prefer it to be handled with more expertise than in this video. Seems to be a bit of unsystematic guessing.

Also the connections opened could be watched in a router and/or with something like Wireshark.

By @Reubend - 5 months
Is Windows XP on its own really this vulnerable to connections over the internet? This makes it seem like you'll get infected within 10 minutes.

I'm sure there are plenty of vulns in Windows XP by now, but it seems surprising to me that a random IP is getting scanned + infected + exploited within such a span of minutes just because it's running an old OS.

It would actually be pretty interesting to see which vulnerabilities are used for this type of thing. Sort of the opposite of a 0 day, I suppose... very old, well known exploits. But to do that on a PC with totally stock OS software is impressive.

By @koito17 - 5 months
I've never really liked Windows XP, but this video is a bit dishonest. As other commenters have pointed out, at around the 2 minute and 50 second mark, the person has a search query for "xp sp3 worm" in Internet Explorer. While the person in the video admits to disabling firewall and other security features of Windows XP, he never mentions his intent to search for worms targetting the platform and execute them.

There was a time when Windows XP would get infected by staying online overnight, but the most recent example I remember is the Blaster worm[1] from around 2003. I recall having an ADSL subscription back in 2007, and at the time, the ISP provided a device acting as both a modem and router. So in my case, at least since 2007, I wouldn't have to worry much about keeping a computer online overnight.

[1] https://en.wikipedia.org/wiki/Blaster_(computer_worm)?useski...

By @Dwedit - 5 months
Does this include all the official post-abandonment patches (from Microsoft POSReady), and unofficial service pack patches?
By @bilsbie - 5 months
Relevant xkcd https://xkcd.com/350/
By @romanovcode - 5 months
Please. This is fake. The guy installs Trojans offscreen just to make a video.
By @dgeiser13 - 5 months
Does he install ZoneAlarm on it?