Skip Ribbon Commands
Skip to main content
Computer Emergency Response Team of Mauritius (CERT-MU)
Computer Emergency Response Team of Mauritius>Windows 10 Mitigations Make Future Eternalblue Attacks Difficult

Windows 10 Mitigations Make Future Eternalblue Attacks Difficult


 The emergence of a port of the EternalBlue exploit to Windows 10 signals that white-hat researchers have likely done what the NSA has already long ago accomplished. The leaked version of the powerful Windows SMB attack shared by the ShadowBrokers in April was built only to attack Windows XP and Windows 7 machines. The mysterious serial leakers of Equation Group offensive hacking tools may not have been able to get their hands on the intelligence agency’s latest wares, but it likely exists. RiskSense senior security analyst Sean Dillon, one of the architects of the Windows 10 port (PDF download) of EternelBlue, said that the available code had undergone numerous revisions and improvements, indicating a constant development cycle. And given the effectiveness in gaining unauthenticated remote access on just about any Windows machine worldwide, this is an area where a spy agency would continue to invest.

Source:
Threat Post
 
 
Microsoft
 
Contact Information
 
Postal address
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street
Port Louis