Article 4PS07 Exploit for wormable BlueKeep Windows bug released into the wild

Exploit for wormable BlueKeep Windows bug released into the wild

by
Dan Goodin
from Ars Technica - All content on (#4PS07)
xp-worm-800x450.jpg

Enlarge (credit: Aurich Lawson)

For months, security practitioners have worried about the public release of attack code exploiting BlueKeep, the critical vulnerability in older versions of Microsoft Windows that's "wormable," meaning it can spread from computer to computer the way the WannaCry worm did two years ago. On Friday, that dreaded day arrived when the Metasploit framework-an open source tool used by white hat and black hat hackers alike-released just such an exploit into the wild.

The module, which was published as a work in progress on Github, doesn't yet have the polish and reliability of the EternalBlue exploit that was developed by the NSA and later used in WannaCry. For instance, if the people using the new module specify the wrong version of Windows they want to attack, they'll likely wind up with a blue-screen crash. Getting the exploit to work on server machines also requires a change to default settings in the form of a registry modification that turns on audio sharing.

By contrast, the wormable EternalBlue exploit-which a still-unidentified group calling itself the Shadow Brokers released into the wild in April 2017-worked seamlessly against a wide range of Windows versions in their default settings. A month after the leak, EternalBlue was folded into the Wannacry ransomware worm that shut down computers worldwide. A month later, another EternalBlue-driven attack called NotPetya created still more worldwide destruction.

Read 8 remaining paragraphs | Comments

index?i=T3eqN9hS_ZE:ynJfe65CyTM:V_sGLiPB index?i=T3eqN9hS_ZE:ynJfe65CyTM:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments