Fact-checked by Grok 2 weeks ago

EternalBlue

EternalBlue is a remote code execution exploit developed by the National Security Agency (NSA) that targets a critical vulnerability, designated CVE-2017-0144, in the version 1 (SMBv1) protocol implemented in Windows operating systems from through 2016. The vulnerability allows an unauthenticated attacker to send specially crafted packets to an SMB server, leading to with system-level privileges on unpatched targets without requiring user interaction. released a patch addressing this flaw as part of security bulletin MS17-010 on March 14, 2017, but the exploit's code was publicly leaked a month later by hacking group, which had obtained it from NSA stockpiles. The exploit's widespread impact stemmed from its integration into self-propagating , most notably the WannaCry worm that erupted on May 12, 2017, infecting over 200,000 systems across 150 countries and disrupting including hospitals, factories, and networks. EternalBlue's efficiency in exploiting default-enabled SMBv1 on legacy Windows installations—coupled with slow patching in enterprise and consumer environments—enabled rapid lateral movement within networks, amplifying the attack's scale and economic toll, estimated in billions of dollars. Beyond WannaCry, the tool powered variants like EternalRocks and contributed to destructive campaigns such as NotPetya, underscoring persistent risks from unpatched vulnerabilities and the consequences of government-held zero-days entering the wild. Despite patches and deprecation of SMBv1, EternalBlue endures as a vector for cybercriminals targeting outdated systems, with ongoing detections in modern threats due to incomplete remediation in global IT ecosystems.

History

NSA Development and Initial Use

EternalBlue was developed by the United States National Security Agency (NSA), specifically its Tailored Access Operations (TAO) division, as a sophisticated remote code execution exploit targeting a zero-day vulnerability in the Microsoft Windows Server Message Block version 1 (SMBv1) protocol implementation. The tool manipulated SMB packet processing to achieve kernel-level access without authentication, allowing persistent compromise of affected systems across Windows versions from XP to Server 2016. Development occurred within the NSA's Equation Group operations, with the exploit refined over multiple years prior to 2017 to ensure high reliability and evasion of detection. The NSA initially deployed EternalBlue in targeted campaigns against foreign adversaries, leveraging its ability to silently penetrate networks for intelligence gathering. Operators integrated it with complementary implants, such as the backdoor, to establish command-and-control access and exfiltrate data from high-value targets. Internal assessments praised its effectiveness, noting near-universal success rates on unpatched systems, which prompted its frequent use despite acknowledged risks of tool loss or adversary reverse-engineering. Agency decision-making favored retaining the exploit for operational superiority rather than disclosing the underlying vulnerability (later designated CVE-2017-0144) to via the government's Vulnerabilities Equities Process, a choice later criticized for enabling widespread exploitation post-leak. This hoarding reflected a calculated , prioritizing short-term gains against long-term cybersecurity risks to domestic and global systems.

Shadow Brokers Leak

The Shadow Brokers, a hacker group that surfaced in August 2016, claimed to have obtained tools from the Equation Group, an advanced persistent threat actor widely attributed to the U.S. National Security Agency (NSA). In initial posts, the group released samples of the stolen data and attempted to auction the full archive for one million bitcoins, but received no buyers and subsequently made portions publicly available. This marked the beginning of a series of dumps exposing what were described as sophisticated cyber intrusion tools developed for intelligence operations. On April 14, released a major archive titled "Lost in Translation," containing a significant portion of the Equation Group toolkit. The dump included the FuzzBunch exploit framework, a modular system for launching attacks, along with implant tools and exploits targeting various systems. Central to this release was , an exploit module enabling remote code execution via vulnerabilities in the version 1 (SMBv1) protocol, specifically addressing CVE-2017-0144 among related flaws (CVE-2017-0143 through CVE-2017-0148). The archive also featured the backdoor, which EternalBlue could deploy to establish persistent access on compromised Windows hosts. The leaked tools were characterized as originating from NSA operations circa 2013, predating many public patches, though had issued updates for the EternalBlue-targeted vulnerabilities under bulletin MS17-010 on , 2017, following responsible disclosure. Security Response Center personnel triaged the release on April 15, 2017, confirming that the SMB-related exploits, including EternalBlue, EternalChampion, EternalRomance, and EternalSynergy, were mitigated by existing patches for supported Windows versions ( and later). Three additional exploits in the dump—EnglishmanDentist, EsteemAudit, and ExplodingCan—targeted unsupported or legacy platforms and posed no risk to current systems. The group had previously hinted at the dump by releasing a password on April 8, 2017, framing it as an "" accessible over the holiday weekend. While ' identity and exact acquisition method remain unverified, the tools' sophistication and operational details aligned with known NSA capabilities, as corroborated by cybersecurity analyses. The April 2017 leak represented the fifth major release by the group, shifting from auction attempts to free dissemination, which rapidly enabled widespread adaptation of EternalBlue in both state-sponsored and criminal campaigns.

Microsoft Disclosure and Patching

disclosed the vulnerability underlying EternalBlue, classified as CVE-2017-0144, on March 14, 2017, via security bulletin MS17-010. This critical update addressed multiple remote code execution flaws in the version 1 (SMBv1) protocol implementation, enabling unauthenticated attackers to execute arbitrary code on vulnerable systems by transmitting specially crafted packets over a network. Affected platforms included SP2, SP2, SP1, SP1, , , versions 1511 and 1607, and 2016. The patch was deployed as part of Microsoft's routine "" release cycle, with specific knowledge base articles such as KB4012598 for and KB4012217 for providing the necessary updates to mitigate the SMBv1 server defects. classified the as critical due to its potential for widespread exploitation without user interaction, assigning it a CVSS v3 base score of 9.8. Deployment recommendations emphasized immediate application via , manual download, or enterprise tools like WSUS, targeting systems still using the deprecated SMBv1 protocol. In response to the ' April 14, 2017, leak of the EternalBlue exploit and its subsequent use in global attacks, extended patching beyond supported systems. On May 13, 2017, the company released emergency out-of-band security updates for end-of-support operating systems, including SP3, , and SP2, adapting the MS17-010 fixes to these legacy platforms despite prior commitments to withhold updates. This exceptional measure aimed to curb ongoing propagation of worms like WannaCry, which exploited unpatched instances of the vulnerability nearly two months after the initial patch availability. reiterated that SMBv1 disablement via tools like PowerShell's Disable-WindowsOptionalFeature cmdlet offered additional protection on updated systems.

Technical Aspects

Core Vulnerability (CVE-2017-0144)

CVE-2017-0144 constitutes a remote execution vulnerability in the version 1 (SMBv1) server component, enabling an unauthenticated attacker to execute arbitrary code on a target system by transmitting specially crafted packets over the network. The flaw resides within the Windows kernel's srv.sys driver, which handles protocol processing, and permits exploitation without requiring user interaction or authentication, provided the target exposes the SMBv1 service on port 445. This vulnerability was publicly disclosed on March 14, 2017, as part of Bulletin MS17-010, which rated it critical with a CVSS v3 base score of 9.8 due to its high impact on , , and . At its core, the vulnerability arises from an during the parsing of Trans2 requests involving file extended attributes, particularly in the function responsible for converting File Extended Attribute (FEA) list sizes from ULONG to USHORT formats in srv!SrvOS2FeaListSizeToNtFeaList. This mishandling allows an attacker to supply oversized input that triggers a heap-based , corrupting adjacent memory structures in the non-paged pool and facilitating control over execution flow, such as overwriting return addresses or function pointers to inject . The overflow exploits the lack of proper bounds checking on the FEA list size, enabling remote kernel-level code execution with privileges once triggered. The vulnerability affects multiple Windows operating systems with SMBv1 enabled by default, including Service Pack 2, Service Pack 2 and R2 Service Pack 1, Service Pack 1, , and 2012 R2, and certain versions of prior to the March 2017 patches (e.g., updates KB4012606, KB4013198, KB4013429). Systems running and Server 2003 were also vulnerable but received an patch from on May 13, 2017, following initial non-inclusion in standard support cycles. Exploitation reliability varies by architecture (x86 vs. x64) and mitigations like (ASLR), but the core issue persists until the MS17-010 patch is applied, which enforces stricter input validation and size checks in SMBv1 transaction handling.

Exploit Functionality and DoublePulsar Integration

EternalBlue functions as a remote execution exploit targeting the version 1 (SMBv1) protocol on vulnerable Windows systems, enabling unauthenticated attackers to execute arbitrary at the level. It leverages a heap-based (CVE-2017-0144) in the srvnet.sys driver, specifically through an in the srv!SrvOS2FeaListSizeToNt function responsible for handling File Extended Attribute (FEA) lists. This allows crafted SMB packets to misallocate memory, leading to conditions that corrupt adjacent structures and facilitate over execution . The exploit's mechanism involves sending a sequence of SMB commands, including SMB_COM_NT_TRANSACT followed by SMB_COM_TRANSACTION2 secondary requests, where the smaller transaction size triggers the despite the larger initial allocation. Attackers employ techniques to position in predictable memory locations, ensuring reliable execution of the upon overflow exploitation. Once triggered, the shellcode grants SYSTEM-level privileges, allowing full compromise of the target without over port 445. This capability made EternalBlue highly effective for lateral movement in networks, as it requires no user interaction or credentials. DoublePulsar serves as a stealthy -mode backdoor , designed to provide persistent, fileless access by executing arbitrary or loading dynamic-link libraries (DLLs) directly into kernel memory. It operates via communications using TRANS2_SESSION_SETUP packets, employing with a fixed key and specific opcodes—such as 0x23 for a "" test to verify installation, 0xc8 for injection, and 0x77 to disable or kill the . Lacking built-in , DoublePulsar relies on the initial for deployment but maintains low detectability by mimicking legitimate SMB traffic and avoiding disk writes. Integration between EternalBlue and is synergistic, with EternalBlue providing the entry point for initial code execution to deploy the backdoor. The EternalBlue injects DoublePulsar into the , after which subsequent commands can leverage the implant for payload delivery, such as modules, without re-exploiting the . This combination enables efficient, worm-like , as seen in attacks where DoublePulsar facilitated into userland processes or direct kernel code execution post-installation via EternalBlue. Both tools, leaked together by group in April 2017, were engineered for seamless chaining, enhancing their utility in targeted intrusions by minimizing forensic footprints.

Associated Malware and Worms

EternalRocks Worm

EternalRocks is a self-propagating that emerged in May 2017, leveraging seven tools from the U.S. (NSA) arsenal leaked by hacking group. Discovered by security researcher Enes Aykac and publicly detailed around May 21, 2017, the targets vulnerabilities in the Windows Server Message Block () version 1 (SMBv1) protocol, enabling lateral movement across networks without user interaction. Unlike the contemporaneous WannaCry , which relied primarily on the EternalBlue exploit, EternalRocks incorporates a broader toolkit for redundancy and resilience against partial mitigations, including mechanisms to evade detection by delaying propagation and using for command-and-control (C&C) communications. The worm's propagation begins with random IP address scanning to identify potential targets, followed by vulnerability probes using an SMBTouch module to assess exploit viability before attempting infection. It deploys six SMB exploitation modules—EternalBlue (targeting CVE-2017-0144), EternalChampion (CVE-2017-0146), EternalRomance (CVE-2017-0143), EternalSynergy (CVE-2017-0147), and two additional unnamed variants—alongside the DoublePulsar backdoor implant for payload delivery and persistence. Upon successful compromise, EternalRocks installs a modular backdoor trojan that establishes encrypted connections to C&C servers via the Tor network, downloading further components such as a replication module to repeat the cycle on new hosts. This design allows for potential modular upgrades, including future ransomware or data exfiltration payloads, without immediate destructive actions that could alert victims. EternalRocks demonstrated greater sophistication than WannaCry in its use of multiple redundant exploits, reducing dependency on a single vulnerability and complicating containment efforts in unpatched environments. However, its spread remained limited, with fewer than 10 confirmed infections reported globally by late May 2017, attributable to Microsoft's preemptive patch for the core MS17-010 vulnerabilities released on March 14, 2017, and heightened awareness following WannaCry. Security analyses highlighted its "doomsday" potential for widespread disruption if weaponized further, but no large-scale outbreaks materialized, as the worm lacked WannaCry's aggressive encryption trigger and relied on stealth over speed. Mitigation emphasized applying SMB patches, disabling SMBv1, and monitoring for anomalous Tor traffic or SMB scanning patterns.

Integration in Ransomware Frameworks

EternalBlue's design as a remote code execution exploit targeting the SMBv1 protocol (CVE-2017-0144) enabled its adaptation into architectures for automated network propagation, transforming static encryptors into self-spreading threats. Integration typically involved embedding the exploit's core components—such as triggers and payloads—directly into the binary, allowing it to scan for vulnerable hosts on ports 445 and 139, authenticate via null sessions or weak credentials, and deploy modules post-exploitation. This often paired with backdoors like for persistence, where the initial exploit granted kernel-level access to execute routines without user intervention, amplifying infection rates on unpatched systems running through Server 2016. In variants beyond initial high-profile outbreaks, such as observed from late , EternalBlue was incorporated via dedicated exploit kits, dropping files like blue.exe alongside libraries (libeay32.dll, ssleay32.dll) to facilitate lateral movement within internal networks. The would exploit vulnerabilities to download secondary payloads (ms.exe, setup.exe) from command-and-control servers, encrypt files with AES-128, and append ransom notes demanding 0.3 BTC, demonstrating modular reuse of the leaked NSA code for enhanced delivery efficiency. U.S. government assessments highlight ongoing integration in diverse campaigns through 2020, with multiple families leveraging EternalBlue and related kits like EternalSynergy to achieve on legacy Windows platforms, often chaining the exploit with file encryptors for . This persistence stemmed from incomplete patching and the exploit's availability in penetration testing frameworks like , where modules enabled rapid prototyping of ransomware delivery vectors, though direct transplantation of original Fuzzbunch-derived code predominated in criminal adaptations.

Major Incidents

WannaCry Outbreak (May 2017)

The WannaCry outbreak began on May 12, 2017, when the self-propagating cryptoworm began infecting unpatched Windows systems worldwide by exploiting the EternalBlue vulnerability (CVE-2017-0144) in the version 1 (SMBv1) . The , which combined with worm-like lateral movement, leveraged the NSA-developed EternalBlue exploit alongside the backdoor to gain initial access and install itself without requiring user interaction or lures. Once installed, WannaCry scanned networks for vulnerable hosts, encrypted files using AES-128 and RSA-2048 algorithms, and appended a .WNCRY extension while displaying a ransom note demanding approximately $300–$600 in for decryption keys. The worm's rapid dissemination was facilitated by its automated propagation module, which targeted through and Server 2003/2008 systems lacking the March 14, 2017, patch (MS17-010), affecting an estimated 200,000 to 300,000 computers across more than 150 countries within days. Initial hotspots included the , where it disrupted operations at the (NHS), forcing the cancellation of thousands of appointments and surgeries across 80 trusts; Taiwan's state media; and manufacturing firms like and , which halted production lines. reported infections in sectors ranging from healthcare and to logistics, with early detections in , , and contributing to over 45,000 confirmed attacks by May 12. The attack's scale was exacerbated by the prevalence of legacy systems unable to receive updates, despite 's emergency patches for end-of-support products like on May 13. Propagation halted abruptly on May 12 after British cybersecurity researcher registered a hardcoded ("iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com") embedded in WannaCry's as a kill-switch check; the queried this before encrypting files, and its existence triggered a self-quarantine mechanism, preventing further spread. This accidental discovery neutralized the worm's global outbreak within hours, though infected systems remained encrypted, and variant strains emerged sporadically thereafter. Ransom payments totaled only about $140,000 in across roughly 320 transactions, suggesting limited financial motivation compared to disruption. Attribution efforts linked WannaCry to North Korea's Lazarus Group based on code similarities, such as shared tools for data wiping and infrastructure overlaps with prior attacks like the 2016 Bangladesh Bank heist, as reported by Symantec and U.S. investigators. The U.S. Department of Justice later charged a North Korean programmer in 2018 for involvement in WannaCry and related intrusions, citing operational patterns consistent with state-sponsored hacking. However, definitive forensic proof remains circumstantial, with some analysts noting discrepancies in tactics that question a purely nation-state origin, emphasizing instead the exploit's availability post-Shadow Brokers leak. The outbreak underscored vulnerabilities in patch management and the risks of stockpiled exploits entering wild circulation.

NotPetya Attack (June 2017)

The malware campaign commenced on June 27, , with initial infections occurring through a tampered software update for M.E.Doc, a tax accounting application widely used by businesses in the region. This vector delivered the to thousands of endpoints, exploiting unpatched systems to establish footholds in corporate networks. For lateral propagation, NotPetya integrated the EternalBlue exploit (CVE-2017-0144), targeting the SMBv1 protocol in Windows systems to execute remote code and install backdoors without authentication. This allowed automated scanning and infection of vulnerable hosts on the same , amplifying spread beyond initial victims; complementary mechanisms included WMI commands, PsExec for access, and for harvesting credentials to bypass patches or enable further jumps. Despite Microsoft's emergency patch for EternalBlue in March 2017, widespread non-adoption—particularly in legacy or resource-constrained environments—facilitated rapid dissemination, with infections reported within hours across continents. The malware's core functionality encrypted the master file table (MFT) on infected drives, rendering operating systems unbootable and destroying data irreversibly, while displaying a fake ransom note demanding $300 in via a single, quickly saturated address that rendered payments futile. Unlike genuine , decryption keys were hardcoded and non-functional, confirming its wiper nature designed for rather than profit. Global fallout included operational halts at A.P. Moller-Maersk, where EternalBlue-enabled spread disrupted shipping terminals and incurred $300 million in losses; faced vaccine production shutdowns costing over $870 million; and other victims like and Mondelez reported hundreds of millions in damages, underscoring vulnerabilities. Intelligence agencies, including the US Department of , attributed NotPetya to Russia's Unit 74455 ( group), indicting six officers in October 2020 for deploying destructive worldwide, with the attack's focus on aligning with geopolitical tensions but its EternalBlue use enabling uncontrolled global spillover. This incident highlighted EternalBlue's dual-use risk post-leak, as state actors repurposed NSA tools for deniable disruption, evading full containment despite pre-existing mitigations.

Subsequent Exploits (e.g., Baltimore and Others)

In May 2019, the city government of , , experienced a attack that leveraged the EternalBlue exploit to disseminate RobbinHood across its Windows-based servers. The intrusion, detected on May 7, 2019, encrypted critical systems including services, databases, and processing, rendering them inoperable for weeks. This disruption forced the cancellation of city council meetings, halted invoice payments, and impeded property transactions, with recovery efforts estimated to exceed $18 million in costs for hardware replacement, overtime, and external expertise. Baltimore officials publicly attributed the attack's severity to the persistence of unpatched SMBv1 vulnerabilities exploitable via EternalBlue, criticizing federal agencies for prior stockpiling of the tool that enabled its proliferation after the 2017 leak. The city declined to pay the $120,000 ransom demand and sought designation as a federal to access relief funds, underscoring inadequate patching in legacy government IT infrastructure. Following the Baltimore incident, EternalBlue remained a vector for opportunistic attacks, with security analyses reporting its integration into kits and lateral movement tools targeting outdated Windows installations. By 2020, U.S. government advisories identified MS17-010 (EternalBlue's CVE) among the most routinely exploited vulnerabilities, often in tandem with weak in sectors like healthcare, where SMBv1 exposure facilitated worm-like propagation. Network from 2022 indicated that over 91% of detected SMB port 445 probes attempted EternalBlue variants, reflecting cybercriminals' preference for its reliability against unpatched systems despite available mitigations. These exploits typically evaded detection by exploiting default configurations in environments slow to disable SMBv1 or apply March 2017 patches.

Impacts

Economic and Operational Damages

The EternalBlue vulnerability, exploited in the WannaCry outbreak of May 2017, inflicted an estimated $4 billion in global economic losses, encompassing direct ransom demands, system recovery expenses, and productivity halts across more than 230,000 infected computers in 150 countries. In the alone, the attack disrupted operations, leading to the cancellation of 19,000 appointments and incurring £92 million in costs for lost services and subsequent IT remediation. The NotPetya malware, which leveraged EternalBlue for propagation starting June 27, 2017, generated damages estimated at $10 billion worldwide, as assessed by the White House, primarily through operational shutdowns in sectors like shipping, pharmaceuticals, and logistics. Affected entities included Maersk, which halted global container operations for weeks, reporting $250–300 million in losses, and FedEx, with an economic impact exceeding $1 billion from disrupted supply chains. These figures exclude unquantified long-term effects such as eroded customer trust and accelerated cyber insurance premium hikes. Subsequent EternalBlue variants contributed to localized damages, such as the May 2019 attack on city systems, which encrypted thousands of computers and email servers, costing over $18 million in recovery, hardware replacements, and lost productivity while paralyzing like property records and permitting for months. Operationally, EternalBlue's wormable nature enabled rapid lateral movement within unpatched networks, causing cascading failures: WannaCry forced factory shutdowns at companies like and , while NotPetya rendered 10% of Ukraine's computers inoperable and idled Merck's vaccine production for months, underscoring the exploit's capacity for self-propagating denial-of-service beyond mere data encryption. Such disruptions highlighted systemic risks from unaddressed legacy Windows deployments, amplifying downtime costs in where patching delays averaged weeks to months.

Affected Industries and Geographies

The EternalBlue exploit, enabling remote code execution in unpatched Windows systems via SMBv1, has disproportionately affected industries with legacy infrastructure, including healthcare, , , and , primarily through its integration in WannaCry and NotPetya. These sectors often maintain older operating systems for compatibility, amplifying vulnerability to lateral movement and ransomware deployment. Healthcare organizations faced acute disruptions from WannaCry on May 12, 2017, with the UK's experiencing outages across 80 trusts, resulting in over 19,000 canceled appointments, diverted ambulances, and delayed surgeries. hospitals and Taiwanese facilities also reported infections, underscoring the sector's reliance on vulnerable Windows endpoints for patient records and imaging systems. NotPetya further compounded risks in Ukrainian hospitals, encrypting systems and halting critical operations. Logistics and shipping industries incurred massive operational halts; WannaCry encrypted systems, while NotPetya paralyzed A.P. Møller-Mærsk across 17 terminals worldwide—from to —freezing global container tracking and incurring $250–300 million in direct losses from manual workarounds and network rebuilds. Pharmaceuticals like Merck suffered $870 million in halted vaccine production from NotPetya, highlighting interdependencies. Manufacturing entities, including automotive firms and during WannaCry, faced assembly line shutdowns due to infected control systems. Government and energy sectors were also targeted, with NotPetya disrupting Ukrainian power grids (Ukrenergo) and federal agencies, alongside Rosneft's Russian operations. In the US, EternalBlue powered the May 2019 Baltimore ransomware attack, locking city email, payroll, and real estate systems for over three weeks and costing $18 million in recovery, despite prior patches being available. Geographically, EternalBlue's propagation via wormable exploits enabled near-simultaneous global spread, with WannaCry infecting over 200,000 systems across more than 150 countries, including heavy concentrations in the , , , , , , and . NotPetya originated in —impacting banks, airports, and the monitoring site—before cascading through multinational networks to (Denmark, , ), the US (e.g., hospitals), and , with total damages exceeding $10 billion due to cross-border effects. Subsequent uses, like , illustrate persistent risks in North American public sectors.

Controversies

Vulnerability Stockpiling Debate

The (NSA) discovered the vulnerability underlying EternalBlue, designated CVE-2017-0144, in Microsoft's version 1 (SMBv1) protocol around 2013 and developed an exploit for it, retaining the capability as part of its arsenal of zero-day vulnerabilities for offensive cyber operations against foreign adversaries. This stockpiling practice allows intelligence agencies to maintain access to enemy networks for and disruption, with NSA officials arguing that such tools provide a strategic edge in monitoring threats like or terrorist financing, and that retention is necessary because disclosure would eliminate their utility. However, the agency's internal assessments recognized the risks of compromise, as vulnerabilities could be stolen and repurposed against U.S. interests or civilians if leaked. The U.S. government's Vulnerabilities Equities Process (VEP), an interagency framework established in the early 2010s, evaluates whether to disclose discovered vulnerabilities to vendors for patching or retain them for purposes, with former NSA Director Mike Rogers stating in that disclosure is the default for most cases to prioritize defensive cybersecurity. For EternalBlue, the NSA opted for retention due to its operational value, but following indications of a breach by group in late 2016, the agency notified in early 2017, leading to the release of patch MS17-010 on March 14, 2017. The full exploit code was publicly leaked by on April 14, 2017, enabling its rapid weaponization in attacks like WannaCry less than a month later. The EternalBlue incident fueled debate over vulnerability stockpiling, with critics including President arguing that government retention endangers global users by delaying patches and incentivizing adversaries to exploit the same flaws, as evidenced by WannaCry's disruption of over 200,000 systems in 150 countries, including critical healthcare infrastructure. Proponents, including security experts like Jason Healey, contend that selective retention is essential for intelligence gathering and deterrence, noting that the NSA discloses the vast majority of vulnerabilities it finds—potentially thousands annually—and that complete disclosure would undermine U.S. cyber capabilities without guaranteeing vendor fixes or user patching. Post-WannaCry analyses called for VEP reforms to better weigh leak risks, increase transparency, and involve input, though defenders emphasized that of successful operations justifies the trade-offs, while acknowledging that leaks like EternalBlue demonstrate the inherent volatility of stockpiled tools.

Attribution of Leaks and Attacks

The EternalBlue exploit, designated as CVE-2017-0144, was developed by the U.S. (NSA) as part of its toolkit for targeting SMBv1 protocol vulnerabilities in Windows systems. The tool was publicly leaked on April 14, 2017, by the hacking collective known as , who released a password-protected archive containing EternalBlue alongside other NSA-derived exploits during an auction-style dump on platforms like and . Attribution of ' origins remains inconclusive, with U.S. intelligence assessments suggesting possible involvement of Russian state actors or insiders, though no definitive evidence has linked specific entities; the group claimed to have compromised an staging server, but their operational security and linguistic patterns have fueled speculation without resolution. In the WannaCry ransomware outbreak of May 12, 2017, which leveraged EternalBlue for initial propagation, the U.S. government, alongside allies including the , , and , attributed responsibility to North Korean state-sponsored actors, particularly the , based on malware code similarities to prior DPRK operations like the 2016 heist and shared infrastructure indicators. The U.S. Department of Justice further charged a North Korean programmer, , in 2018 with involvement in WannaCry and related attacks, citing forensic analysis of command-and-control servers and flows. However, independent analyses by firms like have contested this, arguing discrepancies in attack methodology—such as WannaCry's indiscriminate global spread versus North Korea's targeted financial espionage—and lack of kill-switch sophistication aligning with DPRK tactics, suggesting possible false-flag elements or unattributed criminal reuse. The NotPetya destructive wiper attack, initiated on June 27, 2017, and also exploiting EternalBlue, drew near-unanimous attribution to Russia's Main Intelligence Directorate (), specifically Unit 74455, from U.S., , and Australian authorities, who cited code overlaps with prior GRU tools, targeted Ukrainian infrastructure focus amid the Russo-Ukrainian , and operational patterns like credential harvesting from Russian-Turkish M.E.Doc. In October 2020, the U.S. unsealed indictments against six GRU officers for NotPetya's deployment, supported by showing hardcoded Ukrainian tax software updates as the infection vector and wiper payloads mimicking for deniability. Unlike WannaCry, NotPetya's state-on-state intent—causing over $10 billion in damages primarily to Ukraine—aligns with geopolitical evidence, though Russia has denied involvement, claiming it as uncontrolled criminal activity. Subsequent EternalBlue exploits, including ransomware campaigns against U.S. municipalities like in 2019 and criminal adaptations by groups such as RETEF, lack firm state attributions and are generally viewed as opportunistic criminal of the leaked tool, with no credible ties to nation-states beyond initial adopters; these underscore challenges in tracing commoditized vulnerabilities amid proliferation. Government attributions for major incidents rely on classified intelligence, which, while corroborated by open-source reverse-engineering, invite scrutiny for potential politicization in adversarial contexts.

Legacy

Persistent Threats and Mitigation Strategies

Despite the release of Microsoft's MS17-010 on , 2017, which addresses the CVE-2017-0144 exploited by EternalBlue, the exploit persists as a vector for lateral movement and propagation in unpatched environments. Windows systems, including those in devices like and ATMs, often remain vulnerable due to patching incompatibilities or operational constraints, with SMBv1 still enabled by default in older versions such as and Server 2003. Threat intelligence from 2024 and early 2025 documents EternalBlue's deployment in targeted operations against organizations in and , facilitating infections by families including and LemonDuck for delivery and data exfiltration. The endurance of EternalBlue stems from systemic issues beyond technical fixes, such as inadequate allowing worm-like spread and slow adoption of protocol upgrades in resource-constrained sectors like and healthcare. In 2025, ransomware campaigns continue to exploit SMBv1 weaknesses, with attackers scanning for open port 445—responsible for over 90% of such -targeted attacks in prior years—to enable unauthenticated access and rapid propagation across networks. These threats disproportionately affect air-gapped or isolated legacy infrastructures where full modernization is impractical, underscoring the causal link between deferred maintenance and ongoing exploit viability. Key mitigation strategies prioritize protocol hardening and defensive layering:
  • Apply patches promptly: Deploy MS17-010 across all supported Windows systems to close the core SMBv1 double-fetch bug enabling remote code execution. For unsupported legacy OSes, virtual patching via endpoint detection tools simulates protection without altering software.
  • Disable SMBv1: Use PowerShell commands (e.g., Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol) or Group Policy to deactivate the protocol, as Microsoft deprecated it in 2013 and removes it by default in modern Windows versions like Windows 11. Verify disablement with Get-SmbServerConfiguration | Select EnableSMB1Protocol.
  • Implement network controls: Block inbound and outbound traffic on TCP ports 139 and 445 at firewalls, especially for internet-facing systems, and segment legacy assets into isolated VLANs to contain potential breaches. Disable guest or anonymous SMB access to prevent unauthenticated enumeration.
  • Upgrade protocols and monitor: Transition to SMBv2 or SMBv3, which include integrity checks absent in SMBv1, and deploy endpoint detection and response (EDR) solutions for behavioral anomaly detection, such as unusual SMB traffic spikes indicative of exploitation. Regular vulnerability scanning ensures patch compliance and exposes residual exposures.
These measures, when combined, reduce EternalBlue's attack surface by addressing both the root vulnerability and propagation pathways, though full eradication requires organizational commitment to phasing out unsupported technologies.

Lessons for Cybersecurity Policy

The exploitation of EternalBlue underscored the risks of government stockpiling of zero-day vulnerabilities, as the U.S. National Security Agency (NSA) developed and retained the exploit targeting Microsoft's (SMB) protocol for offensive purposes without prompt , leading to its leak by group in April 2017 and subsequent widespread use in attacks like WannaCry and NotPetya. This incident highlighted flaws in the U.S. Vulnerabilities Equities Process (VEP), an interagency mechanism established to weigh benefits against public , which has been criticized for opacity and a toward retention that amplifies global harm when exploits proliferate to adversaries. reforms should prioritize transparency in VEP deliberations, such as regular audits and public reporting on retention decisions, and default to for vulnerabilities in ubiquitous unless demonstrably critical to operations, given empirical evidence that leaks often cause disproportionate civilian damage over sustained offensive value. EternalBlue's persistence in unpatched systems—despite Microsoft's release of patch MS17-010 on March 14, 2017—revealed systemic deficiencies in , with WannaCry infecting over 200,000 systems across 150 countries by May 12, 2017, primarily due to delayed updates in environments reliant on version 1. Cybersecurity policies must mandate rigorous update regimes for , including automated patching timelines (e.g., within 30 days for high-severity flaws), disablement of obsolete protocols like SMBv1 by default, and regulatory incentives or penalties to enforce compliance, as evidenced by repeated exploits in sectors like healthcare and government post-2017. Governments should also fund tools for scanning and remediation in resource-constrained entities, recognizing that voluntary adoption fails against state actors weaponizing known flaws. Broader policy implications include fostering international norms against the destructive deployment of leaked exploits, as NotPetya's June 2017 attack—estimated to cause $10 billion in damages—demonstrated how state-sponsored operations can masquerade as to evade attribution and norms. Enhanced bilateral disclosure agreements and sanctions frameworks, calibrated to attack severity, could deter such escalation, while domestic policies shift resources from offensive stockpiling to defensive hardening, as NSA's post-EternalBlue disclosures indicate a partial pivot toward proactive vendor notifications. Ultimately, causal analysis of EternalBlue's fallout affirms that prioritizing empirical over in handling minimizes systemic vulnerabilities in interconnected digital ecosystems.

References

  1. [1]
    CVE-2017-0144 Detail - NVD
    Mar 16, 2017 · Allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability."
  2. [2]
    EternalBlue Exploit: What It Is And How It Works? - SentinelOne
    May 27, 2019 · How does Eternalblue work? This NSA exploit is still causing problems across the web. Learn how to protect your Windows fleet from ...
  3. [3]
    Microsoft Security Bulletin MS17-010 - Critical
    This security update resolves vulnerabilities in Microsoft Windows, related to remote code execution if an attacker sends specially crafted messages to a ...
  4. [4]
    The Leaked NSA Spy Tool That Hacked the World - WIRED
    Mar 7, 2018 · EternalBlue is the name of both a software vulnerability in Microsoft's Windows operating system and an exploit the National Security Agency developed to ...
  5. [5]
    SMB Exploited: WannaCry Use of "EternalBlue" | Mandiant
    May 26, 2017 · The recent WannaCry ransomware takes advantage of this vulnerability to compromise Windows machines, load malware, and propagate to other machines in a network.
  6. [6]
    Indicators Associated With WannaCry Ransomware - CISA
    Jun 7, 2018 · The latest version of this ransomware variant, known as WannaCry, WCry, or Wanna Decryptor, was discovered the morning of May 12, 2017, by an independent ...
  7. [7]
    Eternally Blue: Baltimore City leaders blame NSA for ransomware ...
    May 28, 2019 · EternalBlue was part of a set of tools developed for the NSA's Tailored Access Operations (TAO) group that were leaked by Shadow Brokers in 2017 ...
  8. [8]
    NSA officials worried about the day its potent hacking tool would get ...
    May 16, 2017 · The National Security Agency began using a new hacking tool called EternalBlue, those entrusted with deploying it marveled at both its uncommon power and the ...
  9. [9]
    The Shadow Brokers Leaked Exploits Explained | Rapid7 Blog
    Apr 18, 2017 · A hacking group known as the “Shadow Brokers” released a trove of alleged NSA data, detailing exploits and vulnerabilities in a range of technologies.
  10. [10]
    Shadowbroker releases alleged NSA EquationGroup Exploit Code ...
    Apr 20, 2017 · The Sonicwall Threats Research team is actively researching the exploit and malware code released on Good Friday, (4/14/2017), ...
  11. [11]
    Protecting customers and evaluating risk - Microsoft
    Apr 15, 2017 · Today, Microsoft triaged a large release of exploits made publicly available by Shadow Brokers. Understandingly, customers have expressed ...Missing: leak | Show results with:leak
  12. [12]
  13. [13]
    MS17-010: Security update for Windows SMB Server: March 14, 2017
    Mar 14, 2017 · MS17-010: Security update for Windows SMB Server: March 14, 2017 ... This security update resolves vulnerabilities in Microsoft Windows.Security Update Deployment · Windows Vista (all Editions) · Windows 7 (all Editions)
  14. [14]
    WannaCrypt ransomware worm targets out-of-date systems - Microsoft
    May 12, 2017 · The ransomware, known as WannaCrypt, appears to have affected computers that have not applied the patch for these vulnerabilities.
  15. [15]
    Customer Guidance for WannaCrypt attacks - Microsoft
    May 13, 2017 · For customers that run Windows Update, the tool will detect and remove WannaCrypt and other prevalent malware infections. Customers can also ...
  16. [16]
    EternalBlue - Everything There Is To Know - Check Point Research
    Sep 29, 2017 · CVE-2017-0144 is the CVE ID in MS17-010 that is related to EternalBlue. SMB Protocol. Server Message Block (SMB), one version of which is ...
  17. [17]
    Open-Source Command and Control of the DOUBLEPULSAR Implant
    Oct 2, 2019 · Perhaps the most damaging code in that release was ETERNALBLUE, an SMB remote root exploit against a vast range of Windows versions. The code ...
  18. [18]
    DoublePulsar SMB Implant Activity - ExtraHop
    Sep 27, 2025 · The DoublePulsar Windows kernel-mode implant is a command-and-control (C&C) agent that can enable an unauthenticated attacker to run ...<|separator|>
  19. [19]
    Understanding DoublePulsar: Protecting Windows Boxes - Black Duck
    May 7, 2017 · A hacking tool leaked in April by a mysterious organization is attacking older Windows boxes, exposing gaps in organizational update and upgrade policies.
  20. [20]
    EternalRocks Network Worm Leverages 7 NSA Hacking Tools
    May 22, 2017 · EternalRocks is the first known malware incorporating all seven of the NSA hacking tools to compromise systems and install a secret backdoor ...Missing: date | Show results with:date
  21. [21]
    Meet EternalRocks, WannaCry's Scarier Successor - Fortune
    May 21, 2017 · Security researchers have identified a new strain of malware that targets the same vulnerability that helped ransomware spread to computers ...Missing: discovery date
  22. [22]
    EternalRocks Emerges, Exploits Additional ShadowBroker ...
    A new malware called EternalRocks was discovered in late May that uses not only EternalBlue and DoublePulsar—the two National Security Agency (NSA) exploits ...<|separator|>
  23. [23]
    EternalRocks leaves backdoor trojan for remote access to infected ...
    What we know so far The WannaCry ransomware worm outbreak from last Friday week used just one of the leaked NSA exploit tools, ETERNALBLUE, which exploits ...
  24. [24]
    WannaCry 2.0: Detect and Patch EternalRocks Vulnerabilities Now
    May 23, 2017 · Network worm EternalRocks leverages 7 NSA tools from the ShadowBrokers dump, making it more dangerous than WannaCry. Tenable can detect all ...
  25. [25]
    EternalRocks worm combines seven leaked NSA attack tools
    May 23, 2017 · Hard on the heels of the WannaCry ransomware attacks, a researcher has found a worm that combines four NSA exploits and associated attack ...
  26. [26]
    Threat Spotlight: EternalBlue Exploit Breeds EternalRocks Malware
    Jun 21, 2017 · The discovery of a new worm known as EternalRocks shows that clever utilization of the tools contained within the recent Shadow Brokers dump ...
  27. [27]
    EternalRocks Worm Uses 7 Leaked NSA Hacking Tools
    May 22, 2017 · It presents a potential threat that could have far worse consequences than WannaCry.
  28. [28]
    EternalRocks Malware - New 'Doomsday' Worm. - SecPod
    May 23, 2017 · The Blackhats have created a new strain of malware that targets the same vulnerability as the WannaCry ransomware from the first week of May ...
  29. [29]
    EternalRocks worm uses seven NSA exploits (WannaCry used two)
    May 22, 2017 · The recently discovered EternalRocks joins a set of highly infectious bugs created from the NSA's leaked tools.
  30. [30]
    EternalRocks - NHS England Digital
    May 24, 2017 · Threat details. Like the WannaCry ransomware, EternalRocks uses an NSA tool known as EternalBlue to spread itself from one computer to the next ...Missing: analysis | Show results with:analysis
  31. [31]
    Working mechanism of Eternalblue and its application in ransomworm
    The key finding of the analysis is that the code remains almost the same when Eternalblue is transplanted into Wannacry, which indicates its potential for ...
  32. [32]
    Satan Ransomware employs EternalBlue Exploit Kit - SonicWall
    Apr 26, 2018 · The Satan ransomware has been around since early 2017 but it was not until late 2017 that we have seen it adopt the use of the EternalBlue ...
  33. [33]
    Top 10 Routinely Exploited Vulnerabilities - CISA
    May 12, 2020 · ... ransomware attacks in 2020. Mitigations. This Alert ... Associated Malware: Multiple using the EternalSynergy and EternalBlue Exploit Kit ...
  34. [34]
    EternalBlue: Metasploit Module for MS17-010 | Rapid7 Blog
    May 19, 2017 · This week, EternalBlue has been big news again due to attackers using it to devastating effect in a highly widespread ransomware attack, ...
  35. [35]
    Ransomware WannaCry: All you need to know - Kaspersky
    What happened to the WannaCry hacker? We discuss the WannaCry ransomware attack and how to protect your computer.
  36. [36]
    WannaCry - A Propagation brought to you by EternalBlue and ...
    Learn about the WannaCry ransomware attack, which spread rapidly across 150 countries in 2017, impacting over 100000 organizations.
  37. [37]
    What is WannaCry | Ransomware Attack Examples - Imperva
    WannaCry is ransomware that spreads itself by exploiting a vulnerability in the Windows Server Message Block (SMB) protocol.<|control11|><|separator|>
  38. [38]
    More than 150 countries affected by massive cyberattack, Europol ...
    May 14, 2017 · Europol confirmed Sunday that computer networks in more than 150 countries and more than 200,000 people had been affected by one of the ...<|separator|>
  39. [39]
    Massive ransomware infection hits computers in 99 countries - BBC
    May 13, 2017 · Cyber-security firm Avast said it had seen 75,000 cases of the ransomware - known as WannaCry and variants of that name - around the world.
  40. [40]
    Massive ransomware cyber-attack hits nearly 100 countries around ...
    May 12, 2017 · Security researchers with Kaspersky Lab have recorded more than 45,000 attacks in 99 countries, including the UK, Russia, Ukraine, India, China, ...
  41. [41]
    What was the WannaCry ransomware attack? - Cloudflare
    A security researcher discovered a "kill switch" that essentially turned off the malware. However, many affected computers remained encrypted and unusable until ...
  42. [42]
    The Confessions of Marcus Hutchins, the Hacker Who ... - WIRED
    May 12, 2020 · ... Hutchins who had found and triggered the secret kill switch contained in its code, neutering WannaCry's global threat immediately. This ...
  43. [43]
    Marcus Hutchins on halting the WannaCry ransomware attack
    May 12, 2022 · A kill switch was discovered by British security researcher Marcus Hutchins, who inadvertently stopped the attack by registering a web domain found in the ...
  44. [44]
    More evidence for WannaCry 'link' to North Korean hackers - BBC
    May 23, 2017 · A hacking group closely tied to North Korea was behind the massive WannaCry attack earlier this month, security company Symantec says.
  45. [45]
    More Evidence Points to North Korea in Ransomware Attack
    May 22, 2017 · Other digital crumbs linking the North Korean group to WannaCry include a tool that deletes data that had been used in other Lazarus attacks.
  46. [46]
    North Korean Regime-Backed Programmer Charged With ...
    Sep 6, 2018 · The Conspiracy's malicious activities include the creation of the malware used in the 2017 WannaCry 2.0 global ransomware attack; the 2016 theft ...Missing: attribution | Show results with:attribution
  47. [47]
    North Korea is unlikely to be behind the WannaCry attack
    DPRK's “cyber executive branch”, Lazarus Group, is somewhat characterized by and known for the same TTPs across different attacks. These tools are over ...
  48. [48]
    WannaCry and the International Law of Cyberspace - Just Security
    Dec 22, 2017 · Little definitive evidence has been released supporting the conclusion that North Korea, through the Lazarus Group, was behind the WannaCry ...
  49. [49]
    Petya Ransomware | CISA
    Feb 15, 2018 · Microsoft Windows operating systems. Overview. This Alert has been updated to reflect the U.S. Government's public attribution of the ...<|control11|><|separator|>
  50. [50]
    NotPetya Ransomware Attack [Technical Analysis] - CrowdStrike
    Jun 29, 2017 · NotPetya combines ransomware with the ability to propagate itself across a network. It spreads to Microsoft Windows machines using several propagation methods.
  51. [51]
    The Untold Story of NotPetya, the Most Devastating Cyberattack in ...
    Aug 22, 2018 · Global corporations are simply too interconnected, information security too complex, attack surfaces too broad to protect against state ...
  52. [52]
    What are Petya and NotPetya? | Ransomware attacks - Cloudflare
    These three steps can help make a Petya or NotPetya attack far less likely: Strengthening email security practices: Most Petya attacks, and some NotPetya ...
  53. [53]
    Six Russian GRU Officers Charged in Connection with Worldwide ...
    Oct 19, 2020 · The NotPetya malware, for example, spread worldwide, damaged computers used in critical infrastructure, and caused enormous financial losses.
  54. [54]
    Hackers reportedly used a tool developed by the NSA to attack ...
    May 25, 2019 · According to security experts, hackers used EternalBlue, which exploits a vulnerability in certain versions of Microsoft's Windows XP and Vista ...
  55. [55]
    EternalBlue behind crippling Baltimore attack | Rimstorm
    In Baltimore's case, the exploit was used May 7 to spread Robbinhood ransomware, shutting down most of the city's servers and forcing the city council to cancel ...
  56. [56]
    In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc
    May 25, 2019 · A leaked NSA cyberweapon, EternalBlue, has caused billions of dollars in damage worldwide. A recent attack took place in Baltimore, the agency's own backyard.Missing: timeline | Show results with:timeline
  57. [57]
    Baltimore ransomware attack: NSA faces questions - BBC
    May 27, 2019 · Politicians seek briefings from the US cyber-agency over claims it has links to a ransomware breach.
  58. [58]
    [PDF] SMB Vulnerabilities in Healthcare | HHS.gov
    Nov 5, 2020 · SMBv1.0: Very similar to the CIFS protocol that shares the files over a network to access them among the clients in an effective way. SMB.
  59. [59]
    Majority of attacks against SMB protocol attempt to exploit EternalBlue
    May 11, 2022 · Barracuda researchers found that 91.88% of the attacks on port 445 (the most common SMB port) attempted to use the EternalBlue exploit.
  60. [60]
    EternalBlue reaching new heights since WannaCryptor outbreak
    May 17, 2019 · Two years after the Wannacry aka WannaCryptor ransomware outbreak, the EternalBlue exploit that powered the massive incident is more popular ...Missing: details origin
  61. [61]
    WannaCry: Lessons Learned 1 Year Later | SECURITY.COM
    May 15, 2018 · Within a day, WannaCry had spread around the world, infecting more than 230,000 computer systems in 150 countries and costing approximately $4 ...Missing: total | Show results with:total
  62. [62]
    WannaCry cyber-attack cost the NHS £92m after 19000 ...
    Oct 12, 2018 · The WannaCry ransomware attack cost the NHS a total of £92m through services lost during the attack and IT costs in the aftermath.
  63. [63]
    [PDF] NotPetya: A Columbia University Case Study
    In this case study, we examine the ramifications of a Russian cyber-attack directed towards the. Ukraine and associated businesses – now known as “NotPetya” ...
  64. [64]
    [PDF] Could NotPetya's Tail Be Growing? - Verisk
    We found an economic impact of approximately US$1 billion for FedEx from the NotPetya attack, up from an initial disclosure of US$300 million.
  65. [65]
    What is NotPetya? 5 Fast Facts | Security Encyclopedia - HYPR
    The UK-headquartered global shipping giant Maersk disclosed economic losses of around $250 million to $300 million, said to be greatly underreported. But with ...
  66. [66]
    Cost of Baltimore ransomware attack so far: $18 million
    Jun 4, 2019 · Cost of Baltimore ransomware attack so far: $18 million ... The New York Times reported late last month that the attack was undertaken with a ...
  67. [67]
    A retrospective impact analysis of the WannaCry cyberattack ... - NIH
    Oct 2, 2019 · Financial impact. The total economic value of the lower activity at the infected trusts during the WannaCry week was £5.9 m (95% confidence ...<|separator|>
  68. [68]
    NotPetya still roils company's finances, costing organizations $1.2 ...
    NotPetya has cost organizations $1.2 billion in combined quarterly and yearly revenue, according to calculations Cybereason made using figures from quarterly ...
  69. [69]
    Why Governments Won't Let Go of Secret Software Bugs - WIRED
    May 16, 2017 · The attack spread by exploiting a Windows server vulnerability known as EternalBlue. The NSA discovered the bug and was holding on to it ...
  70. [70]
    The NSA Confronts a Problem of Its Own Making - The Atlantic
    Jun 29, 2017 · An attack on Tuesday featuring Eternal Blue was the second of these to use stolen NSA cyber tools—disrupting everything from radiation ...
  71. [71]
    A Role for the Vulnerabilities Equities Process in Securing Software ...
    Jan 11, 2021 · For instance, when the NSA first discovered the SMBv1 vulnerability, better known as EternalBlue, the agency elected to exploit it rather than ...
  72. [72]
    IT'S TIME TO REFORM THE U.S. VULNERABILITIES EQUITIES ...
    Sep 2, 2021 · The trust deficit was badly damaged by NSA's decision to retain the EternalBlue vulnerability until 2017. Despite NSA's recent efforts to ...
  73. [73]
    Press Briefing on the Attribution of the WannaCry Malware Attack to ...
    Dec 19, 2017 · The United Kingdom, Australia, Canada, New Zealand, and Japan have seen our analysis, and they join us in denouncing North Korea for WannaCry.
  74. [74]
    Cyber-attack: US and UK blame North Korea for WannaCry - BBC
    Dec 19, 2017 · The US and UK governments have said North Korea was responsible for the WannaCry malware attack affecting hospitals, businesses and banks across ...
  75. [75]
    White House Blames Russia for NotPetya, the 'Most Costly ... - WIRED
    Feb 15, 2018 · The attribution of NotPetya to Russia represents a far more proactive response to the threat of Russian hacking, says Thomas Rid, a professor at ...
  76. [76]
    Foreign Office Minister condemns Russia for NotPetya attacks
    Feb 15, 2018 · Foreign Office Minister Lord Ahmad has today attributed the NotPetya cyber-attack to the Russian Government.
  77. [77]
    The leaked NSA hacking tools keep showing up in criminal schemes
    Sep 25, 2017 · In practice, EternalBlue will allow a hacker to quickly compromise multiple computers on a shared network as long as they are all similarly ...Missing: attribution | Show results with:attribution
  78. [78]
    EternalBlue - The Persistent Threat of a Leaked NSA Exploit
    May 27, 2025 · Recent threat intelligence reports from 2024 and early 2025 confirm that EternalBlue is still being used in targeted operations against ...Missing: 2023 | Show results with:2023
  79. [79]
    Why Microsoft SMBv1 Threats Linger [Tackle these Challenges]
    Sep 18, 2024 · Table of contents. SMBv1 and malware: The story so far; Ransomware is not the only SMB threat; How to protect against SMBv1 exploits; Wrapping ...<|control11|><|separator|>
  80. [80]
    Detect, enable, and disable SMBv1, SMBv2, and SMBv3 in Windows
    Mar 11, 2025 · After you enable SMBv1 auditing, you can check the Microsoft-Windows-SMBServer\Audit event log for access events. Each time a client attempts to ...SMBv1 is not installed by default
  81. [81]
    Taking a Hard Look at the Vulnerabilities Equities Process and its ...
    Apr 22, 2019 · [50] This vulnerability, “EternalBlue,” was a manufactured exploit that the NSA had used for years before it was stolen and leaked in a 2016 ...
  82. [82]
    Vulnerabilities Equities Process Revisited
    May 28, 2019 · The Vulnerabilities Equities Process (VEP) is an interagency framework used to determine whether the United States government should withhold or disclose zero- ...
  83. [83]
    Auditing the Government's Vulnerability Stockpile - SSRN
    Jul 29, 2025 · In 2017, the WannaCry and NotPetya attacks wreaked havoc on a global scale, resulting in significant harm to governments, companies, ...Missing: implications | Show results with:implications
  84. [84]
    When should the government stockpile software vulnerabilities?
    Nov 16, 2017 · Intelligence agencies collect and protect secrets. Given their line of work, this default position makes perfect sense a lot of the time—but ...Missing: implications | Show results with:implications
  85. [85]
    MS-ISAC Security Primer – EternalBlue
    Jan 7, 2019 · EternalBlue exploits allows cyber threat actors to remotely execute arbitrary code and gain access to a network by sending specially crafted ...
  86. [86]
    Everything you need to know about EternalBlue – the NSA exploit
    Jun 28, 2017 · The best way to be protected from EternalBlue is to install the Microsoft patch detailed above. This will stop the SMB protocol being exploited ...
  87. [87]
    NotPetya Ransomware: Lessons Learned - Infosecurity Magazine
    Oct 20, 2017 · After WannaCry, questions were asked about patching frequency, and the NotPetya attack seems to have resurfaced those questions. I'm ...<|separator|>
  88. [88]
    War, Terrorism, and Catastrophe in Cyber Insurance: Understanding ...
    Oct 5, 2020 · NotPetya showed that cyber risk was greater than previously recognized, with higher potential for “aggregation”—the accumulation of losses ...
  89. [89]
    The NSA found a dangerous flaw in Windows and told Microsoft to fix it
    Jan 14, 2020 · In 2017, the agency reported a hacking tool called EternalBlue to Microsoft, which proceeded to issue a fix. That report came after an opaque ...<|control11|><|separator|>
  90. [90]
    Attribution: A Major Challenge for EU Cyber Sanctions
    An Analysis of WannaCry, NotPetya, Cloud Hopper, Bundestag Hack and the Attack on the OPCW.Missing: controversies | Show results with:controversies<|control11|><|separator|>
  91. [91]
    The Ethics of Zero-Day Exploits: The NSA Meets the Trolley Car
    Jan 1, 2021 · It is certainly true that the NSA developed the EternalBlue exploit for use against a foreign adversary, and not, presumably, the British health ...