Trend Micro, the company that discovered CoinMiner, recommends turning off WMI on a machine if it is not needed or at least restricting access to WMI to just one admin account, only IT staff.
Instructions on how to turn off SMBv1 and WMI are given at this address https://support.microsoft.com/en-us/help/2696547/how-to-enable-and-disable-smbv1-smbv2-and-smbv3- in-windows-and-windows and https://msdn.microsoft.com/en-us/library/aa826517(v=vs.85).aspx . For more detailed information, Trend Micro also released a detailed step-by-step technical report of CoinMiner. http://blog.trendmicro.com/trendlabs-security-intelligence/cryptocurrency-miner-uses-wmi-eternalblue-spread-filelessly/
CoinMiner is not the first digital digging tool to use EternalBlue to attack victims. Adylkuzz is the first malware of its kind, starting to attack shortly after the Shadow Brokers team leaked it on the network. On the other hand, CoinMiner is one of the few less-than-non-program-based virtual money digging tools.