Security Market Segment LS
Friday, 11 May 2018 09:29

NSA exploit that powered WannaCry used much more these days

The WannaCry ransomware caused havoc in many parts of the world. The WannaCry ransomware caused havoc in many parts of the world. Pixabay

A year after a leaked NSA Windows exploit known as EternalBlue was used to create the WannaCry ransomware that caused chaos around the world, a security researcher says it is being used more than ever by attackers in crafting threats.

Ondrej Kubovič of the Slovakian security firm ESET said in a blog post that while WannaCry was rarely seen these days, EternalBlue was still posing a threat to both patched and unpatched systems.

He cited the company's telemetry that showed the popularity of the exploit, one of many crafted by the NSA and leaked on the Web in April 2016 by a group known as the Shadow Brokers, had been growing over the last few months, with a recent spike being even bigger that its peaks in 2017.

EternalBlue exploits a flaw in an obsolete version of Microsoft's implementation of the Server Message Block protocol through port 445; it was patched by the company a month before the exploit was leaked. To this day, there is no clue as to the identity of the Shadow Brokers.

"Black hats scan the Internet for exposed SMB ports, and if found, (they) launch the exploit code," Kubovič wrote.

If the attacker found a vulnerable system, then a payload of his/her choice would be run on the target and this was how WannaCry was distributed across networks.

WannaCry was stopped in its tracks when British security researcher Marcus Hutchins registered a domain he had found in its source code; the malware had been programmed to check this domain, and continue spreading if it could not access the domain.

Kubovič said EternalBlue had a quiet period after the ravages of WannaCry, with detections dropping to a few hundred a day. But since September 2017, the use of the exploit had continued to grow and had reached new heights in mid-April.

"One possible explanation for the latest peak is the Satan ransomware campaign seen around those dates, but it could be connected to other malicious activities as well," he said.

Apart from WannaCry, EternalBlue has also powered the Petya (aka NotPetya, Nyetya or Golden Eye) ransomware in June 2017 and the BadRabbit ransomware campaign in the last three months of 2017. It was also used by the Sednit (aka APT28, Fancy Bear and Sofacy) cyber-espionage group to attack Wi-Fi networks in European hotels.

"This exploit and all the attacks it has enabled so far highlight the importance of timely patching as well as the need for a reliable and multi-layered security solution that can block the underlying malicious tool," Kubovič said.


You cannot afford to miss this Dell Webinar.

With Windows 7 support ending 14th January 2020, its time to start looking at your options.

This can have significant impacts on your organisation but also presents organisations with an opportunity to fundamentally rethink the way users work.

The Details

When: Thursday, September 26, 2019
Presenter: Dell Technologies
Location: Your Computer


QLD, VIC, NSW, ACT & TAS: 11:00 am
SA, NT: 10:30 am
WA: 9:00 am NZ: 1:00 pm

Register and find out all the details you need to know below.



iTWire can help you promote your company, services, and products.


Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments