Free EternalBlue Vulnerability Scanner Released

SumG

Level 2
Thread author
Verified
Apr 26, 2017
89
A free tool that can scan networks to discover computers that are vulnerable to the NSA-linked EternalBlue exploit is now available.

EternalBlue is a tool that hacker group ShadowBrokers allegedly stolen from the National Security Agency (NSA)-linked Equation Group. It was made public in April this year, one month after Microsoft released patches for it and for various other exploits. -

In addition to being fully ported to Metasploit, EternalBlue was one of the seven NSA exploits to have been included in a network worm dubbed EternalRocks. What made the exploit famous, however, was its use in the global WannaCry outbreak.

Weeks before WannaCry, however, a stealth Remote Access Trojan (RAT) was using the exploit to compromise systems. The cryptocurrency miner Adylkuzz was also abusing EternalBlue before WannaCry. Additionally, the UIWIX ransomware was using the exploit around the same time as WannaCry.

Over the past week, EternalBlue came into focus once again, as it started being used in yet another worldwide outbreak by the destructive NotPetya wiper.

Microsoft president and chief legal officer Brad Smith has already warned of the risks that stockpiling exploits brings along, and a bi-partisan group of lawmakers already announced the introduction of the 'Protecting Our Ability to Counter Hacking Act of 2017' -- the PATCH Act.

This, however, does little to protect companies from attacks leveraging EternalBlue, especially if they are unaware of the existence of vulnerable machines within their networks. Dubbed Eternal Blues, the newly released free tool is meant to provide a helpful hand by scanning their network for computers that can be compromised via this exploit.

According to the tool’s developer Elad Erez, Eternal Blues has been already tested on real world networks. The utility wasn’t meant to exploit the vulnerability, but only to find it and notify of its existence.

“The majority of latest WannaCry, NotPetya victims are not technical organizations and sometimes just small business who don’t have a security team, or even just an IT team to help them mitigate this. I aimed to create a simple ‘one-button’ tool that tells you one thing and one thing only – which systems are vulnerable in your network,” Erez explains.

The developer also advises admins who find vulnerable computers using his tool to apply the necessary patches as soon as possible, and also to disable SMBv1, even on patched systems, considering that the protocol was written over three decades ago. The tool, he reveals, sends anonymous usage statistics through Google Analytics, including number of scanned computers and found vulnerabilities.
 

orthonovum

Level 3
Verified
Jun 17, 2017
106
FWIW it looks like it *will* have false positives, it returned "yes" on some hosts that I know are not running the affected windows versions and are not exploitable when tested.


BTW this tool also works under Linux, just make sure you have mono and wine installed :)

apt-get install mono-vbnc, mono-complete
 

orthonovum

Level 3
Verified
Jun 17, 2017
106
  • Like
Reactions: AtlBo

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
OK thanks. I found the download on a site called omerez and didn't know anything about Imperva or omerez or the dev so thought I would ask :)
 
  • Like
Reactions: Sunshine-boy

orthonovum

Level 3
Verified
Jun 17, 2017
106
File blocked by Windows 10 SmartScreen and Zemana Anti-Malware.

Does not surprise me, smart screen blocks anything unrecognized that was downloaded via a browser. Your anti malware is probably detecting it because it is using checks that eternalblue would use etc

Palo Alto wildfire shows the file as Benign

File Type PE
File Signer
SHA-256 4d0be7ec27350f218aff516c7621fe7a00b4818af0fd6f4f36b7ce775311c330
SHA-1 f6c624dd1310ceb36b7e51d1eccad1ca9241f39f
MD5 5c6c4371fd9a41241f67d59b13fd5d52
File Size 1486848 bytes
First Seen Timestamp 2017-06-30 07:09:32 PDT
Verdict Benign

VT Results:
Antivirus scan for 4d0be7ec27350f218aff516c7621fe7a00b4818af0fd6f4f36b7ce775311c330 at 2017-06-30 16:35:02 UTC - VirusTotal
 
  • Like
Reactions: AtlBo and RoboMan

RoboMan

Level 34
Verified
Top Poster
Content Creator
Well-known
Jun 24, 2016
2,399
Does not surprise me, smart screen blocks anything unrecognized that was downloaded via a browser. Your anti malware is probably detecting it because it is using checks that eternalblue would use etc

Palo Alto wildfire shows the file as Benign

File Type PE
File Signer
SHA-256 4d0be7ec27350f218aff516c7621fe7a00b4818af0fd6f4f36b7ce775311c330
SHA-1 f6c624dd1310ceb36b7e51d1eccad1ca9241f39f
MD5 5c6c4371fd9a41241f67d59b13fd5d52
File Size 1486848 bytes
First Seen Timestamp 2017-06-30 07:09:32 PDT
Verdict Benign

VT Results:
Antivirus scan for 4d0be7ec27350f218aff516c7621fe7a00b4818af0fd6f4f36b7ce775311c330 at 2017-06-30 16:35:02 UTC - VirusTotal
Probably right. Not saying it's dangerous. Just reporting. Captain Teemo on duty!
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top