As announced a couple of years ago, Microsoft stopped releasing support for the Windows 7 operating system from the beginning of 2020. Information security specialists emphasize that while individual users do not have the option to extend support for their Windows 7 devices, Microsoft enterprise customers might request an extension on support by up to three more years, paying for service to the company.
Apparently the only option to continue using Windows 7 was to join the Extended Security Updates (ESU); however, some members of the cybersecurity community revealed a hack that allowed them to get extended updates without paying to Microsoft even some users claimed that the method worked perfectly.
Although information security experts assumed that Microsoft would fix this flaw, it has been shown to remain functional. It is not known if it is a new way to dodge patches released on January 14 or if it is simply a Microsoft omission, but the trick is fully functional.
Any user of the Windows 7 system can follow these simple steps to enable extended security updates without charges:
- Install the bypass on your system. The latest version is available on the MDL forum. Alternatively, or you can download it from GitLab (Password: 2020)
- Later, install the Windows 7 ESU test patch KB4528069
- Now restart your PC and install the following updates: KB4538483, KB4537820, KB4537767, KB4537813
- Finally, restart your Windows 7 machine again to complete the installation process
In addition, another hack also allows you to install the latest SSU:
- Install the bypass on your Windows 7 device and then install the ESU test update
- Now, in this step, remove the bypass
- Download and install SSU update KB4537829 and KB4537820
According to the information security specialists from the International Institute of Cyber Security (IICS), even though the hack works for any Windows 10 user, it could stop working at any time in the future, so it is up to users deciding whether to install the bypass or not.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.