EternalBlue

EternalBlue Description

EternalBlue ScreenshotThe EternalBlue exploitation device isn't new since it was leaked in April 2017 by a group called 'The Shadows Brokers.' The EternalBlue exploitation device uses vulnerabilities in the implementation of the SMB protocol of Windows and can work on old versions that were used before the release of Windows 8 since they have an interprocess communication share (IPC$) that enables a null session. By using the null session, the criminals can create a connection using an anonymous login that enables the null session by default, allowing the server to receive multiple commands from the client.

The EternalBlue exploitation device exploits three bugs, the 'Non-paged Pool Allocation Bug,' the 'Wrong Casting Bug' and the 'Wrong Parsing Function Bug.' The Non-paged Pool Allocation Bug installs various threatening components on the infected machines and will attack the ones with frail passwords. The EternalBlue exploitation device also adds a Monero crypto miner, XMRig that will accomplish its main objective; crypt-mining. The EternalBlue exploitation device can also b used to execute many more tasks on the devices it infects. Computer users affected by it should use an anti-malware product to detect and remove the EternalBlue exploitation device from their machines immediately.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.