Tuesday, March 2, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Metasploit team releases BlueKeep exploit

September 7, 2019
in Internet Security
ASD releases warning of BlueKeep vulnerability
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

The developers of the Metasploit penetration testing framework have released today a weaponized exploit for the BlueKeep Windows vulnerability.

While other security researchers have been released defanged BlueKeep proof-of-concept code in the past, this exploit is advanced enough to achieve code execution on remote systems, infosec experts who reviewed the Metasploit module have told ZDNet.

You might also like

Singapore eyes more cameras, technology to boost law enforcement

Free cybersecurity tool aims to help smaller businesses stay safer online

Judge approves $650m settlement for Facebook users in privacy, biometrics lawsuit

What is BlueKeep?

BlueKeep, also known as CVE-2019-0708, is a vulnerability in the Remote Desktop Protocol (RDP) service in older versions of the Windows operating system (Windows XP, Windows 2003, Windows 7, Windows Server 2008, and Windows Server 2008 R2).

Microsoft patched BlueKeep in the May 2019 Patch Tuesday security fixes released on May 14, and warned users to apply the patches as soon as possible.

At the time, to spur users into patching faster, the OS maker described BlueKeep as a “wormable” vulnerability that can self-propagate in a similar manner similar to how the EternalBlue exploit helped the WannaCry ransomware propagate to millions of computers in 2017.

Since it was made public, the cyber-security community has been holding its collective breath for the release of a first weaponized BlueKeep exploit, fearing it may be abused in the same manner and help power a global malware outbreak.

Microsoft has repeatedly told users to apply patches, and even the US National Security Agency (NSA), the US Department of Homeland Security, Germany’s BSI cyber-security agency, the Australian Cyber Security Centre, and the UK’s National Cyber Security Centre have issued security alerts urging users and companies to patch older versions of Windows.

Various cyber-security firms and security researchers have developed BlueKeep exploits, but all declined to release the code, fearing its consequences.

In July, the infosec community got a first scare when a cyber-security company named Immunity Inc. started selling a private BlueKeep exploit; however, the exploit remained private and never leaked.

The new BlueKeep Metasploit module

But today, Rapid7, the cyber-security firm behind the open-source Metasploit framework, published a BlueKeep exploit as a Metasploit module, available to everyone.

Unlike the tens of BlueKeep proof-of-concept exploits that have been uploaded on GitHub over the past months, this module can achieve code execution.

However, the Metasploit module has been somewhat defanged. Currently it only works in a “manual” mode, meaning it needs user interaction to execute correctly.

Metasploit operators must feed it a parameter with information about the system they want to target. This means the exploit can’t be used in an automated manner as a self-spreading worm, but will work for targeted attacks.

For example, a hacker group who gained access to a corporate network can deploy it on a system-by-system basis, and eventually hack into all nearby workstations one by one, if it has enough time at its disposal.

Furthermore, the BlueKeep Metasploit module also only works against 64-bit versions of Windows 7 and Windows 2008 R2, but not the other Windows versions that were also vulnerable to BlueKeep. This small fact also narrows down its possible use for criminal endeavors, although, it does not rule it out.

700,000 systems still vulnerable

Altough a module was released today, security experts don’t expect to see malware campaigns or hacks leveraging right away.

Just like with everything else, there is usually a learning curve even with hackers, as they get used to a tool.

Nonethless, by the time black-hats get used to the module, there will still be plenty of vulnerable systems around. This is because despite having had nearly four months to patch the BlueKeep vulnerability, most users and companies failed to apply Microsoft’s patches.

According to a BinaryEdge scan, there are still 700,000 systems vulnerable to BlueKeep exposed on the internet, and possibly millions more inside firewalled networks.

bluekeep-be-stats.png

Credit: Zdnet

Previous Post

Exim TLS Flaw Opens Email Servers to Remote 'Root' Code Execution Attacks

Next Post

Becoming a Data Scientist is a Perfect Match for those Who Work Part Time

Related Posts

Singapore eyes more cameras, technology to boost law enforcement
Internet Security

Singapore eyes more cameras, technology to boost law enforcement

March 2, 2021
Free cybersecurity tool aims to help smaller businesses stay safer online
Internet Security

Free cybersecurity tool aims to help smaller businesses stay safer online

March 2, 2021
Judge approves $650m settlement for Facebook users in privacy, biometrics lawsuit
Internet Security

Judge approves $650m settlement for Facebook users in privacy, biometrics lawsuit

March 1, 2021
These four new hacking groups are targeting critical infrastructure, warns security company
Internet Security

These four new hacking groups are targeting critical infrastructure, warns security company

February 28, 2021
Privacy Commissioner asks for clarity on minister’s powers in Critical Infrastructure Bill
Internet Security

Privacy Commissioner asks for clarity on minister’s powers in Critical Infrastructure Bill

February 28, 2021
Next Post
Becoming a Data Scientist is a Perfect Match for those Who Work Part Time

Becoming a Data Scientist is a Perfect Match for those Who Work Part Time

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Ask the Expert: What’s New in Azure Machine Learning | Ask the Expert
Machine Learning

Ask the Expert: What’s New in Azure Machine Learning | Ask the Expert

March 2, 2021
Can India beat the global AI challenge? Can we avoid huge job extinction here? | by Yogesh Chauhan | Jan, 2021
Neural Networks

Can India beat the global AI challenge? Can we avoid huge job extinction here? | by Yogesh Chauhan | Jan, 2021

March 2, 2021
Singapore eyes more cameras, technology to boost law enforcement
Internet Security

Singapore eyes more cameras, technology to boost law enforcement

March 2, 2021
Why do companies fail to stop breaches despite soaring IT security investment?
Internet Privacy

Why do companies fail to stop breaches despite soaring IT security investment?

March 2, 2021
Tweaking Algorithmic Filtering to Combat Fake News
Data Science

Tweaking Algorithmic Filtering to Combat Fake News

March 2, 2021
Machine Learning Cuts Through the Noise of Quantum Computing
Machine Learning

Machine Learning Cuts Through the Noise of Quantum Computing

March 2, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Ask the Expert: What’s New in Azure Machine Learning | Ask the Expert March 2, 2021
  • Can India beat the global AI challenge? Can we avoid huge job extinction here? | by Yogesh Chauhan | Jan, 2021 March 2, 2021
  • Singapore eyes more cameras, technology to boost law enforcement March 2, 2021
  • Why do companies fail to stop breaches despite soaring IT security investment? March 2, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates