<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EternalBlue: 1000s of machines still vulnerable in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/EternalBlue-1000s-of-machines-still-vulnerable/m-p/4204#M3767</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/2100"&gt;https://community.checkpoint.com/people/kvars7afe82cf-43ef-4b52-9446-6ac8ba07ce69&lt;/A&gt;‌ do you think we can do a serious of these explainations for all of the elements in EternalRocks?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 Jul 2017 10:14:51 GMT</pubDate>
    <dc:creator>Evan_Dumas</dc:creator>
    <dc:date>2017-07-25T10:14:51Z</dc:date>
    <item>
      <title>EternalBlue: 1000s of machines still vulnerable</title>
      <link>https://community.checkpoint.com/t5/Endpoint/EternalBlue-1000s-of-machines-still-vulnerable/m-p/4203#M3766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;EternalBlue is the a software vulnerability in Microsoft's Windows operating system. It is&amp;nbsp;"Windows SMB Remote Code Execution Vulnerability", and&amp;nbsp;described in CVE-2017-144. The vulnerability exploits Microsoft server message block 1.0 (SMBv1) - a network file sharing protocol. It&amp;nbsp;allows remote attackers to execute arbitrary code via crafted packets, as this vulnerable protocol allows applications on the windows system to read and write to files and request various services that are on same network. This vulnerability become even more lethal with its expose over internet through TCP port 445 - a security research found over a million devices exposing SMB over TCP 445, thus can be attacked from anywhere in the Internet. &amp;nbsp;&lt;/P&gt;&lt;P&gt;Microsoft issued a critical security bulletin &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx"&gt;MS17-010&lt;/A&gt; on 14-March-2017, which included patch for EternalBlue and other SMB related CVEs. Even though this security patch for windows was made available long before&amp;nbsp;&lt;A href="http://blog.checkpoint.com/2017/05/16/crying-futile-sandblast-forensic-analysis-wannacry/"&gt;WannCry&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="http://blog.checkpoint.com/2017/07/03/brokers-shadows-part-2-analyzing-petyas-doublepulsarv2-0-backdoor/"&gt;Petya&lt;/A&gt;&amp;nbsp;ransomware, but many systems around the world remained unpatched; and hence fallen victim to these ransomware. Even&amp;nbsp;after these security incidents followed by awareness drive,&amp;nbsp;1000s of machines still vulnerable to SMBv1 exposure. For large organizations with tens of thousands of hosts, it is extremely difficult to find vulnerable hosts - these are the blind spots in a business network. Security admins must continue to&amp;nbsp;regularly scan for EternalBlue vulnerabilities,&amp;nbsp;disable the SMBv1 protocol, and apply latest patches. But&amp;nbsp;there maybe many more unknown vulnerabilities in this or other protocol - &amp;nbsp;the zero-days.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check Point SandBlast Zero-Day protection family of products protects organization against such zero-day attacks at network gateway, on the endpoint, and in the cloud. Learn more at&amp;nbsp;&lt;A href="https://www.checkpoint.com/products-solutions/zero-day-protection/" title="https://www.checkpoint.com/products-solutions/zero-day-protection/"&gt;SandBlast Zero-Day Protection | Check Point Software&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #000000; margin: 0.8em 0px;"&gt;&lt;SPAN style="background-color: #ffffff; color: #413f41; font-size: 14.0832px;"&gt;&lt;A href="https://community.checkpoint.com/migrated-users/43544"&gt;Jony Fischbein&lt;/A&gt;‌&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jul 2017 21:28:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/EternalBlue-1000s-of-machines-still-vulnerable/m-p/4203#M3766</guid>
      <dc:creator>Kaushal_Varshne</dc:creator>
      <dc:date>2017-07-15T21:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: EternalBlue: 1000s of machines still vulnerable</title>
      <link>https://community.checkpoint.com/t5/Endpoint/EternalBlue-1000s-of-machines-still-vulnerable/m-p/4204#M3767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/2100"&gt;https://community.checkpoint.com/people/kvars7afe82cf-43ef-4b52-9446-6ac8ba07ce69&lt;/A&gt;‌ do you think we can do a serious of these explainations for all of the elements in EternalRocks?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jul 2017 10:14:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/EternalBlue-1000s-of-machines-still-vulnerable/m-p/4204#M3767</guid>
      <dc:creator>Evan_Dumas</dc:creator>
      <dc:date>2017-07-25T10:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: EternalBlue: 1000s of machines still vulnerable</title>
      <link>https://community.checkpoint.com/t5/Endpoint/EternalBlue-1000s-of-machines-still-vulnerable/m-p/4205#M3768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/44203"&gt;https://community.checkpoint.com/people/eduma846337c8-57d0-40ab-aea0-4aa6da5cf474&lt;/A&gt;‌, Yes we can and should do a series of technical explanation of key cyber security incidents. Let me know if you have any such incident in mind.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jul 2017 21:28:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/EternalBlue-1000s-of-machines-still-vulnerable/m-p/4205#M3768</guid>
      <dc:creator>Kaushal_Varshne</dc:creator>
      <dc:date>2017-07-25T21:28:34Z</dc:date>
    </item>
    <item>
      <title>Re: EternalBlue: 1000s of machines still vulnerable</title>
      <link>https://community.checkpoint.com/t5/Endpoint/EternalBlue-1000s-of-machines-still-vulnerable/m-p/4206#M3769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;EternalRocks has 7 components. 1 used in wannacry, one in not petya. Would love to see explaination of each&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Evan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent securely while mobile&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Jul 2017 03:59:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/EternalBlue-1000s-of-machines-still-vulnerable/m-p/4206#M3769</guid>
      <dc:creator>Evan_Dumas</dc:creator>
      <dc:date>2017-07-26T03:59:59Z</dc:date>
    </item>
  </channel>
</rss>

