SMB EternalBlue and DoublePulsar Exploit
EternalBlue is an exploit designed to attack SMB (Server Message Block) file and print sharing services on the affected windows versions.
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
EternalBlue is an exploit designed to attack SMB (Server Message Block) file and print sharing services on the affected windows versions.
Affected platforms
The following platforms are known to be affected:
Threat details
The ShadowBrokers APT (Advanced Persistent Threat) group are well known for auctioning off stolen dumps of exploits, implants and tools reportedly obtained from the NSA. The most recent dump includes an exploit known as EternalBlue.\n\nEternalBlue is an exploit designed to attack SMB (Server Message Block) file and print sharing services on the affected windows versions.\n\nThe tool can be used to exploit a publically accessible SMB service, providing a delivery mechanism for an attack using DoublePulsar - a backdoor also included in the ShadowBrokers dump.\n\nThe EternalBlue vulnerability was patched by Microsoft in March 2017 as part of MS17-010 which many believe was made possible by the NSA pre-warning Microsoft of the vulnerability.\n\nThe Attack enables the self-propagation of malware through NetBIOS and SMB. The malware targets the following specific MS17-010 vulnerabilities: CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147 and CVE-2017-0148.
Remediation steps
| Type | Step |
|---|---|
|
Ensure all systems are protected with the latest AV definitions
SMB Vulnerability Remediation
Advice to NHS staff NHS Staff are advised to ensure their home computers have Windows automatic updates enabled and AV software installed which is automatically updated with the latest definitions. This will help protect their personal computers and the wider internet community at large. |
CVE Vulnerabilities
Last edited: 21 December 2021 12:41 pm