- My Forums
- Tiger Rant
- LSU Recruiting
- SEC Rant
- Saints Talk
- Pelicans Talk
- More Sports Board
- Fantasy Sports
- Golf Board
- Soccer Board
- O-T Lounge
- Tech Board
- Home/Garden Board
- Outdoor Board
- Health/Fitness Board
- Movie/TV Board
- Book Board
- Music Board
- Political Talk
- Money Talk
- Fark Board
- Gaming Board
- Travel Board
- Food/Drink Board
- Ticket Exchange
- TD Help Board
Customize My Forums- View All Forums
- Show Left Links
- Topic Sort Options
- Trending Topics
- Recent Topics
- Active Topics
Started By
Message
Ransomware Alert: WannaCry's successor - EternalRocks
Posted on 5/24/17 at 8:40 am
Posted on 5/24/17 at 8:40 am
LINK
It makes use of seven of the NSA exploit toolkits (versus WannaCry’s two)
According to the blog post by Tenable, if you have the MS17-010 patch installed you should still be good. However, you should still look into disabling SMBv1 (and just stick with SMBv2/3) on all Windows Vista/2008 and later.
It makes use of seven of the NSA exploit toolkits (versus WannaCry’s two)
According to the blog post by Tenable, if you have the MS17-010 patch installed you should still be good. However, you should still look into disabling SMBv1 (and just stick with SMBv2/3) on all Windows Vista/2008 and later.
Posted on 5/24/17 at 9:09 am to ell_13
quote:
The majority of the tools exploit vulnerabilities with standard file sharing technology used by PCs called Microsoft Windows Server Message Block
sounds like there could be another exploit or 2 wrapped in there that pops something other than SMB... maybe
Posted on 5/24/17 at 1:37 pm to gmrkr5
https://github.com/stamparm/EternalRocks
quote:
It spreads through public (The Shadow Brokers NSA dump) SMB exploits: ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE and ETERNALSYNERGY, along with related programs: DOUBLEPULSAR, ARCHITOUCH and SMBTOUCH.
This post was edited on 5/24/17 at 1:39 pm
Popular
Back to top
