Page 1
Page 1
Started By
Message

Ransomware Alert: WannaCry's successor - EternalRocks

Posted on 5/24/17 at 8:40 am
Posted by ell_13
Member since Apr 2013
84936 posts
Posted on 5/24/17 at 8:40 am
LINK

It makes use of seven of the NSA exploit toolkits (versus WannaCry’s two)

According to the blog post by Tenable, if you have the MS17-010 patch installed you should still be good. However, you should still look into disabling SMBv1 (and just stick with SMBv2/3) on all Windows Vista/2008 and later.
Posted by gmrkr5
NC
Member since Jul 2009
14880 posts
Posted on 5/24/17 at 9:09 am to
quote:

The majority of the tools exploit vulnerabilities with standard file sharing technology used by PCs called Microsoft Windows Server Message Block


sounds like there could be another exploit or 2 wrapped in there that pops something other than SMB... maybe
Posted by RussianFromLSU
Baton Rouge, LA
Member since Nov 2014
192 posts
Posted on 5/24/17 at 1:37 pm to
https://github.com/stamparm/EternalRocks

quote:

It spreads through public (The Shadow Brokers NSA dump) SMB exploits: ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE and ETERNALSYNERGY, along with related programs: DOUBLEPULSAR, ARCHITOUCH and SMBTOUCH.
This post was edited on 5/24/17 at 1:39 pm
first pageprev pagePage 1 of 1Next pagelast page
refresh

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram