Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Operating Systems Software Windows

One Year After WannaCry, EternalBlue Exploit Is Bigger Than Ever (bleepingcomputer.com) 62

An anonymous reader quotes a report from Bleeping Computer: Exactly one year after the biggest cyber-security incident in history, the exploit at the heart of the WannaCry attack is now more popular than ever, according to telemetry data gathered by Slovak antivirus vendor ESET. Named EternalBlue, the exploit was supposedly developed by the cyber division of the U.S. National Security Agency. EternalBlue was part of a large cache of tools that a hacker group known as The Shadow Brokers stole from NSA servers in 2016 and then leaked online from August 2016 to April 2017. Many suspect the NSA might have notified Microsoft of what the Shadow Brokers stole, because in March 2017, a month before EternalBlue was released, Microsoft released MS17-010, a security bulletin containing patches for the many SMB-targeting exploits included in the Shadow Broker leak.

Even if EternalBlue is not being used anymore to help ransomware become a virulent nightmare on a global level (only on a network level), most regular users don't know that it's still one of today's biggest threats. This threat doesn't only come from malware authors continuing to weaponize it for a diverse set of operations. Malware authors wouldn't ever bother with an inefficient exploit. ExploitBlue continues to be a threat because of the vulnerable machines still available online. According to Nate Warfield of the Microsoft Security Response Center, there are still plenty of vulnerable Windows systems exposing their SMB service available online.

This discussion has been archived. No new comments can be posted.

One Year After WannaCry, EternalBlue Exploit Is Bigger Than Ever

Comments Filter:
  • ..ExploitBlue continues to be a threat because ...

    BleepingTypo, not BleepingComputer.

  • by Anonymous Coward

    You can explain to people that to work better, live without paranoia have increased security, have stability and control go use linux.

    It just does not work though, if we were logical animals out for our best interest and getting things done windows would have sank into oblivion decades ago but there is something mentally wrong with the vast majority of us and the obvious solution sitting under everyones nose is ignored to continue what we already know doesn't work.

    *shrug*

    Humans, weird lil monkies I must say

    • If Linux had 90% of the desktop marketshare I guarantee you'd see these exact same exploits. Look how long Heartbleed was around before anyone noticed it.

      • by Anonymous Coward

        I like your justification for not doing the correct thing.

        Keep those excuses coming, you can even pretend their real if you like. I'll just keep getting stuff done while you keep having IT meltdowns every day.

        • I'll switch to Linux as soon as SolidWorks and Altium release builds. At least AutoCAD has a version for OSX but they didn't do that until recently.

          • Re: (Score:2, Informative)

            by Anonymous Coward

            I'll switch to Linux as soon as SolidWorks and Altium release builds. At least AutoCAD has a version for OSX but they didn't do that until recently.

            Technically, Altium already has...
            https://www.altium.com/solution/linux-pcb-design-software
            Maybe not the product you were wishing for, though?

          • I'll switch to Linux as soon as SolidWorks and Altium release builds. At least AutoCAD has a version for OSX but they didn't do that until recently.

            Are you bragging or complaining? I feel badly for people who are locked in to one OS.

            I have one stinking program that only runs on Windows, have to have a machine specifically for that one program, and I surely don't brag about it. Being a W10 machine, it takes more maintenance than all my other computers combined. Latest update took out a USB hub and mouse! Corrupted their drivers.

            I would think that using your bragging points of installed user base and Windows only monoculture programs, that hackers

            • by Anonymous Coward

              Why not use a VM - no need for a physical machine these days for something like that.

      • by Anonymous Coward

        Why limit this discussion to desktops? There are plenty of reasons to target servers and, for that matter, high performance computing systems. A lot of potentially sensitive data could be obtained from compromising servers. And there may be even greater value from compromising high performance computing systems. Some of those systems include dedicated GPU resources. If such a system was compromised, an attacker could use those to mine cryptocurrency on someone else's bill, not to mention what other sensitiv

      • If Linux had 90% of the desktop marketshare I guarantee you'd see these exact same exploits. Look how long Heartbleed was around before anyone noticed it.

        Har! My operating system is best because it has the most exploits! Buy Windows - hackers can't be wrong!

      • by HiThere ( 15173 )

        Sorry, but no. Linux isn't the most secure system, and it definitely has it's weak points. (Archives should never expand already executable, e.g.) But it's a lot better than even modern MSWind. Still, if security were your main consideration you'd either pick one of the BSDs (OpenBSD has the reputation of most secure, but I can't really judge), so something totally else. Probably something where the code can never be executed after being made executable until the next volume remount, or possibly reboo

    • Because for most people it works fine. At least, well enough. And the few times it doesn't, they buy a new computer and move on. They'd rather spend their time watching Netflix than learn a new skill.
    • That's because when you give people that kind of explanation, they will look at you as if you've grown an extra head, and for good reason.

      Honestly, why is this so hard for die-hard Linux people to understand? Linux is *not* a viable option for a significant number of people for a variety of reasons:
      1. The OS is only tangentially important. Concern #1 are the applications, and a lot of those applications just arn't on linux.
      2. There is a learning curve which some people arn't prepared for, ESPECIALLY if it

  • by ELCouz ( 1338259 ) on Sunday May 13, 2018 @12:46AM (#56602614)
    From the article tweet:

    Almost a year after WannaCry and there's still over a million SMB servers without auth exposed to the world. At least it looks like "only" 66k of them are running Windows

    Samba is still using SMB v1 by default on many configurations for legacy purpose.

    • by thomst ( 1640045 )

      ELCouz pointed out:

      From the article tweet:

      Almost a year after WannaCry and there's still over a million SMB servers without auth exposed to the world. At least it looks like "only" 66k of them are running Windows

      Samba is still using SMB v1 by default on many configurations for legacy purpose.

      If I had points, this post would get a +1 Informative upmod.

      I hope someone who has 'em agrees ...

    • by sjames ( 1099 )

      To be fair, without Windows, there would be zero Linux machines running Samba at all. Samba only exists because of Windows.

      And the legacy reason? Supporting Windows machines.

      • And the legacy reason? Supporting Windows machines.

        There's nothing legacy about it. Samba itself is a perfectly fine protocol and one of the few that is actually nicely cross platform which can not be said for NFS or AFS. It nicely decouples the file system attributes from the sharing protocol and allows authentication on a per share level without having to worry about matching file system permissions between the server and clients.

        Hell I used to work at a linux only shop that used samba as its primary way of sharing for exactly this reason.

        • by sjames ( 1099 )

          You should look at the history of it. It took the EU ordering MS to open up to get anything like complete support for the distinctly MS protocol. I wouldn't call it exactly cross platform so much as a triumph of reverse engineering.

          • I wouldn't call it exactly cross platform so much as a triumph of reverse engineering.

            What does the result have to do with the method?

            • by sjames ( 1099 )

              If it was truly cross platform, it would be easier to update Samba to the latest standard.

              Admins would have less reluctance to do updates on a setup that more or less works.

              • Well three things.

                1) This is a red herring since ultimately the point was that there is nothing Legacy and only for supporting Windows machines about Samba.
                2) Samba has no problems adopting the latest standard. In fact the first release candidate of the Samba 4.3 which supports the current 3.1.1 protocol was released before Windows 10 (first to support 3.1.1) was. There was 5 weeks between the release of Windows 10 and Samba 4.3 Stable. Hardly a problem by any stretch of the imagination and a completely non

                • by sjames ( 1099 )

                  Apparently you haven't had to actually deal with compatibility between Linux filesystems and Windows boxes using Samba.

                  It is NOT fun when an upgrade breaks some corner case. The Windows machines certainly won't hint at what is wrong. All you can do is look on the web and hope someone has already figured out the magic incantation that makes the corner case go away or randomly guess at things until you stumble over it.

                  • Apparently you haven't had to actually deal with compatibility between Linux filesystems and Windows boxes using Samba.

                    No I haven't. Mainly because in the past 15 years I haven't seen any.

                    Actually that's a lie, I have seen a few but all have been down to the Samba team changing not some protocol level thing but rather depreciating or introducing some new settings with some default that is overwritten by an old config file.

                    While you're searching across the web, just marvel at the number of "I upgraded and now this doesn't work" Samba "incompatibilities" that are fixed by starting with the default config file for the current

                    • by sjames ( 1099 )

                      You do know those settings affect protocol, right? Meanwhile, they are settings rather than hard coded because SMB isn't really cross platform and so there will be corner cases that need to be handled differently in different environments.

                    • You do know those settings affect protocol, right?

                      You missed the point. The fact that you're able to misconfigure something is not a fundamental compatibility problem in a protocol. A single configuration file will work with all flavours of Windows, Linux, and any other system with Samba installed. If you don't want security problems then you're limited with compatibility to Windows systems only in the last 12 years though.

                      Windows has no hardcoded incompatibility settings anywhere, only Linux does have soft coded settings you can fuck up in its infinite qu

                    • by sjames ( 1099 )

                      Consider, XP just won't die. There are plenty of admins out there who are still stuck with XP.

                      If you're just shuttling a few files back and forth, it's easy. OTOH, if you're dealing with locking and shared filed, it can get "interesting".

    • Yes, but Samba also isn't vulnerable to WannaCry or EternalBlue, so that makes a difference.

  • Microsoft Windows strikes again ..
    • I know. Right. It's like ... you're completely unable to read.

      Almost a year after WannaCry and there's still over a million SMB servers without auth exposed to the world. At least it looks like "only" 66k of them are running Windows

      I mean you don't even need to read a summary, just a 170 character tweet. Too difficult for some people I guess.

  • by Anonymous Coward

    You got to feel sorry for the poor NSA, getting hacked by hackers and all that fake news jazz. It's almost as scary as the terrorists who terrorized us on 9-11. I sleep better at night knowing the NSA is keeping me safe and secure. And heil Hillary as mandated by law! ae911truth dot org

  • Isn't it time Microsoft started changing Windows so that it no longer exposes the horridly broken SMB protocol to the Internet at large (rather than the local LAN) unless you explicitly turn on the ability for the Internet at large to speak SMB to your computer?

    • by Anonymous Coward

      I don't think it is open by default to the internet, because inbound packets on SMB port will surely be blocked by your routers firewall anyway. The problem is that some websites might attack this local SMB port on your machine and hence spread ransomwares. I am on Windows and I patched this SMB hole manually by myself. Fire up your beloved disassembler and pinpoint those hex codes responsible then replace them and then dump the original buggy file. Won't take you more than 2 hours. Verify by running n

      • by PPH ( 736903 )

        will surely be blocked by your routers firewall anyway

        I'll be sure to bring my router with me the next time I use my laptop at the local coffee shop.

    • by thegarbz ( 1787294 ) on Sunday May 13, 2018 @05:28AM (#56603024)

      Microsoft doesn't. It's blocked by default. SMBv1 is also disabled by default and has been for quite a while. Unfortunately there are just as many idiots in the Linux admin world as there are in the Windows world, and the vast majority of these are nothing to do with Windows.

      The summary tweet in TFA:
      "Almost a year after WannaCry and there's still over a million SMB servers without auth exposed to the world. At least it looks like "only" 66k of them are running Windows"

    • The SMB protocol itself isn't "horridly broken", although SMB1 doesn't support the integrity protection that prevents man-in-the-middle downgrade attacks (SMB3 does).

      Specific *implementations* can be broken, but if you're fully patched there are no existing vulnerabilities here.

  • My cybersecurity company is still finding MS08-067 [rapid7.com] all over the place. IT'S ten years old, and it's "bigger than ever!" It's every burgeoning hacker's favorite, since it is so trivial to exploit.
  • "According to Nate Warfield of the Microsoft Security Response Center, there are still plenty of vulnerable Windows systems exposing their SMB service available online."

    That's a Windows feature, right?

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...