![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
The Bluekeep exploit has finally arrived
Home » Forums » Cyber Security Information and Advisories » Code Red – Security/Privacy advisories » The Bluekeep exploit has finally arrived
- This topic has 11 replies, 6 voices, and was last updated 5 years, 6 months ago.
AuthorTopicGoneToPlaid
AskWoody LoungerNovember 2, 2019 at 11:13 pm #1998092Viewing 1 reply threadAuthorReplies-
OscarCP
MemberNovember 2, 2019 at 11:38 pm #1998095From the ZDNet article (link provided by GoneToPlaid): “Instead, a hacker group has been using a demo BlueKeep exploit released by the Metasploit team back in September to hack into unpatched Windows systems and install a cryptocurrency miner.”
Several of us commented back then about this very thing: the public release of the “proof of concept” demo that, at least to us, looked like an insanely irresponsible act by the Metasploit “security” experts.
The fact that this first exploit, that was aimed to turn the attacked PCs into a bunch of cryptocurrency mining drones, has merely caused the PCs to BSOD, because, according to the same article, the attack was conducted by someone who did not know how to use the Metasploit demo malware properly, is not the best reason ever to feel relieved by the fact that nothing worse has happened. For now.
In the meantime, besides being fully up-to-date patched, which I hope most of us already are, what else should we do right now about this?
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
Kirsty
ManagerNovember 3, 2019 at 12:45 am #1998126In the meantime, besides being fully up-to-date patched, which I hope most of us already are, what else should we do right now about this?
From Catalin Cimpanu’s ZDNet article:
…the hackers appear to search for Windows systems with RDP ports left exposed on the internet, deploy the BlueKeep Metasploit exploit, and later a cryptocurrency miner.
It impacts only:
Windows 7
Windows Server 2008 R2
Windows Server 2008So anyone using those systems should check they are patched, and their RDP ports aren’t exposed.
-
-
Kirsty
ManagerNovember 3, 2019 at 12:30 am #1998105BlueKeep (CVE 2019-0708) exploitation spotted in the wild
November 3, 2019
Conclusion:
It is curious that this publicly known wormable vulnerability, known to everyone who would care to know for at least six months, took this long to get detectably weaponized. One might theorize that attackers know they have essentially one shot at using it at scale, and it becomes a game of chicken as to who will do it first. It is also worth noting that mass exploitation for gain can be difficult, owing to the risks involved.Although this alleged activity is concerning, the information security community (correctly) predicted much worse potential scenarios. Based on our data we are not seeing a spike in indiscriminate scanning on the vulnerable port like we saw when EternalBlue was wormed across the Internet in what is now known as the WannaCry attack. It seems likely that a low-level actor scanned the Internet and opportunistically infected vulnerable hosts using out-of-the-box penetration testing utilities.
Read the full article here -
OscarCP
MemberNovember 3, 2019 at 1:52 am #1998127Kirsty: “Based on our data we are not seeing a spike in indiscriminate scanning on the vulnerable port ” It is quite reassuring not to see any evidence of widespread attacks. Thanks for this information.
It does not seem that the malware code used was “weponized”, meaning that something not actually useful as a weapon, only potentially so, was made into one by some crafty criminals. Going by what has transpired so far, what has been used is the very same code released by Metasploit in September as a “proof of concept” to the wide world, so anyone could get a copy and use it at his or her pleasure. Which means that the code has turned out, in the event, to be already useful as a weapon that finally has been used and just in the form it was released from Metasploit. Fortunately, it was not handled very well by the wannabe attacker. Unfortunately, if handled properly and it being already a weapon, anyone who knows how can use it as is to do some real harm. Now I am wondering, thinking about all this, whether the Metasploit people responsible are already having or about to start having a restful time in some cheerful and pleasant County jail looking forward to a fun-filled trial? And if not, why not?
Also, using the link you placed in your previous posting, I have not found any information on RDP, or any mention of Bluekeep. Maybe you meant to put a different link there?
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
Kirsty
ManagerNovember 3, 2019 at 2:09 am #1998159Also, using the link you placed in your previous posting, I have not found any information on RDP, or any mention of Bluekeep. Maybe you meant to put a different link there?
I presume you are referring to the link in #1998126?
That link is to Shields Up!, the port scanner from GRC (Steve Gibson), so those interested can check to see if they have RDP ports exposed. Sorry, I thought that would be helpful…
Once the “fine print” has been read, clicking on Proceed takes one to the action page. -
OscarCP
MemberNovember 3, 2019 at 2:33 am #1998184Kirsty,
Well yes, I was referring to that link. Now, forearmed with the additional information you have so nicely provided, with my Mac (the Win 7 PC is sleeping at the moment) as the computer and Waterfox as the browser, I went in and punched those buttons and got told that my Mac is pretty much invisible to likely attackers and other malcontents and pretty much impenetrable, except that I can get pinged. Now, it’s been quite a while since I used “ping” to see if some server or someone’s machine was up and running and did not know that being pingable was a potential danger. OK, now I know that. So, should I do something about it, or preventing others too ping me would create more problems than it would help prevent? And how does one become unpingable, anyways?
Tomorrow I’ll try this with my Win 7 PC, see what shape it is in.
By the way, did you remember to turn back one hour all your clocks and watches?
As to just how amazingly stealthy my Mac actually is, here is the report I got from GRC (my router also was pronounced pretty stealthy):
———————————————————————-
GRC Port Authority Report created on UTC: 2019-11-03 at 08:20:18
Results from scan of ports: 0, 21-23, 25, 79, 80, 110, 113,
119, 135, 139, 143, 389, 443, 445,
1002, 1024-1030, 1720, 50000 Ports Open
0 Ports Closed
26 Ports Stealth
———————
26 Ports TestedALL PORTS tested were found to be: STEALTH.
TruStealth: FAILED – ALL tested ports were STEALTH,
– NO unsolicited packets were received,
– A PING REPLY (ICMP Echo) WAS RECEIVED.———————————————————————-
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
Paul T
AskWoody MVP -
OscarCP
MemberNovember 3, 2019 at 2:01 pm #1998460Paul T: “The GRC test is effectively only testing your router ”
Let me begin by assuming that these tests are just of the router (the GRC site of the tests does mention “your computer” and “TCP Internet connections”, but it is ambiguous as to what is tested: the router, or the computer itself as well as the router). Then, why should that not be good enough? Virtually all my access to the Internet is through my router. Unless some neighbor is spoofing my WiFi channel between router and laptop, (when — not often — I am using the router’s WiFi, rather than its Ethernet connection) which I very much doubt anyone near enough to me can or will do. I live in a nice apartment building, my neighbors are outstanding people, none of them are experts on informatics, and my laptop very rarely leaves it, so I have never used it in an airport or a Starbucks or connecting it through hot spots. Do these facts rule absolutely any possibility of my being vulnerable to some malignant attacks? Of course not, that would be as realistic as expecting to be invulnerable to Death. But, unless there are reasons to worry that I don’t see here, I would be inclined to think that I am safe enough — and that would be good enough for me.
But, whether this belief of mine is correct or not, I still think that the Metasploit people could be much improved by a reasonably long stint in jail, all expenses covered (except for those few others than can be paid using smuggled cigarettes and such).
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
anonymous
Guest -
OscarCP
MemberNovember 3, 2019 at 4:09 pm #1998528Thank you, Anonymous. I followed your advice and found out that “Ping ICMP flood attacks” are denial of service attacks, where a certain IP address is targeted for so many pings that they make it no longer possible for the owner of that IP to send or receive any Internet messages at all, by keeping the computer too occupied processing the pings, while also using up all the bandwidth available for communicating. Given that as far as the rest of the world is concerned, black hats included, I am a home user of no importance that is not prone to engaging in flaming email combats or in virulently provocative blogging (or in anything worthy of being called ‘blogging’ at all, other than on professional matters), then my very insignificance should be enough protection against this massive, but temporary, form of attack. Or so I hope.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV-
This reply was modified 5 years, 6 months ago by
OscarCP.
-
This reply was modified 5 years, 6 months ago by
-
-
-
-
Viewing 1 reply thread -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Windows 11 Insider Preview build 27863 released to Canary
by
joep517
13 hours, 55 minutes ago -
Windows 11 Insider Preview build 26120.4161 (24H2) released to BETA
by
joep517
13 hours, 56 minutes ago -
AI model turns to blackmail when engineers try to take it offline
by
Cybertooth
6 hours, 40 minutes ago -
Migrate off MS365 to Apple Products
by
dmt_3904
10 hours, 5 minutes ago -
Login screen icon
by
CWBillow
5 hours, 20 minutes ago -
AI coming to everything
by
Susan Bradley
14 hours, 6 minutes ago -
Mozilla : Pocket shuts down July 8, 2025, Fakespot shuts down on July 1, 2025
by
Alex5723
1 day, 5 hours ago -
No Screen TurnOff???
by
CWBillow
1 day, 5 hours ago -
Identify a dynamic range to then be used in another formula
by
BigDaddy07
1 day, 6 hours ago -
InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords
by
Alex5723
1 day, 18 hours ago -
How well does your browser block trackers?
by
n0ads
1 day, 4 hours ago -
You can’t handle me
by
Susan Bradley
4 hours, 22 minutes ago -
Chrome Can Now Change Your Weak Passwords for You
by
Alex5723
21 hours, 1 minute ago -
Microsoft: Over 394,000 Windows PCs infected by Lumma malware, affects Chrome..
by
Alex5723
2 days, 5 hours ago -
Signal vs Microsoft’s Recall ; By Default, Signal Doesn’t Recall
by
Alex5723
1 day, 8 hours ago -
Internet Archive : This is where all of The Internet is stored
by
Alex5723
2 days, 5 hours ago -
iPhone 7 Plus and the iPhone 8 on Vantage list
by
Alex5723
2 days, 5 hours ago -
Lumma malware takedown
by
EyesOnWindows
1 day, 18 hours ago -
“kill switches” found in Chinese made power inverters
by
Alex5723
2 days, 14 hours ago -
Windows 11 – InControl vs pausing Windows updates
by
Kathy Stevens
2 days, 14 hours ago -
Meet Gemini in Chrome
by
Alex5723
2 days, 18 hours ago -
DuckDuckGo’s Duck.ai added GPT-4o mini
by
Alex5723
2 days, 18 hours ago -
Trump signs Take It Down Act
by
Alex5723
3 days, 2 hours ago -
Do you have a maintenance window?
by
Susan Bradley
1 day, 7 hours ago -
Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms
by
Nibbled To Death By Ducks
2 days, 5 hours ago -
Cox Communications and Charter Communications to merge
by
not so anon
3 days, 6 hours ago -
Help with WD usb driver on Windows 11
by
Tex265
17 hours, 21 minutes ago -
hibernate activation
by
e_belmont
3 days, 15 hours ago -
Red Hat Enterprise Linux 10 with AI assistant
by
Alex5723
3 days, 18 hours ago -
Windows 11 Insider Preview build 26200.5603 released to DEV
by
joep517
3 days, 22 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.