Not to "inject" anything to a productive discussion, but this article takes me back to fears of even the late 90s. EB/DP is the vector for the ultimate nastiness if it was intialized as speculated. It's bad enough that it can corrupt critical lsass, but this is the one that can turn anyone's PC into anyone's PC and any time and for any amount of time.
Thanks for all the comments. I am learning alot and hope we all are about how far PC security has to go, even if it has come so far over the last several years. Appreciate your comments Dan, not to cheat anyone out of their differences of opinion. It's a very competent debate imo...
Yeah, I hear what you are saying, and it certainly would have been preferable to stop the attack even sooner... before EB could do anything at all. But I am comforted by the fact that EB was unable to launch and install DP in the VS attack.
If you read the MRG article, they even accept detecting and terminating DP while it is fully running in memory as a block. And here is their conclusion... this is what we need to worry about:
Conclusion
It is nice that all the AV vendors claim to protect against the ransomware payload, but in case there is a backdoor running on your machine in the kernel level, things are not that great.
Please note the ETERNALBLUE exploit was published basically 2 months before Wannacry and this blog post.
If anyone creates an in-memory ransomware which can work with the ETERNALBLUE exploit, the number of ransomwared systems would skyrocket. ETERNALBLUE can be linked with Meterpreter easily, and we have an in-memory Meterpreter ransomware extension. We are sure we are not the only ones having this capability … If there will be an in-memory Meterpreter ransomware in-the-wild soon, we reserve the right to remove this section from the blogpost, and pretend we never wrote this. We are in the middle of contacting all AV vendors about the issue. Although we guess they already know this, they only forgot to notify the marketing department to check their communication.
MRG – ETERNALBLUE vs Internet Security Suites and nextgen protections
On kind of a side note... when I was talking to mWave, I thought it might be a good idea for him to start with EB, and see what he could do to bypass VS:
VoodooShield ?