"Eternal Blues" Tool Tests Computers Against NSA's ETERNALBLUE Exploit

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Forum Veteran
Feb 4, 2016
2,516
15,625
3,578
53
Germany / Poland
..some quotes from the article:

Security researcher Elad Erez has created a tool named Eternal Blues that system administrators can use to test if computers on their network are vulnerable to exploitation via NSA's ETERNALBLUE exploit.
Erez released his tool on Wednesday, a day after the NotPetya ransomware caused damages to thousands of computers across the globe.

Just like WannaCry did in last month's outbreak, NotPetya also used ETERNALBLUE as a means to spread from one computer to the next.

In hacking and cyber-security circles, ETERNALBLUE is considered one of the most potent exploits ever seen. A testament to its efficiency and ability to create virulent threats stand the two ransomware outbreaks that took place just two months after its release.

Under the hood, ETERNALBLUE leverages a vulnerability (CVE-2017-0144) in the SMBv1 file sharing protocol. Windows computers — where SMBv1 comes enabled by default — mishandles specially crafted SMB packets and allows an attacker to execute arbitrary code on the user's computer.
 
@woodrowbone I dont know all the details about this tool, but i guess if port 445 is open , then you are vulnerable.
 
Umbra, I tested it today with the updated version and now all was ok...
Bug in the tool?

/W
 
  • Like
Reactions: frogboy
Ports 445 and 139 seem to be targeted. Some articles suggest creating rules to block incoming traffic (TCP?) on either your Router or Firewall.

As more threats emerge hopefully they will at least use some form of CVD.