A few months later, EternalBlue encroached on both virtual money digging and government spy groups.
Although EternalBlue is no longer used as much to spread extortion code, most users do not know that it is still one of the biggest threats today. Not only because there are still people who are trying to exploit it for their malicious campaigns, but also because there are many devices that are easily poisoned.
According to Nate Warfield, from the Microsoft Security Response Center, many Windows machines are still "displaying" their SMB services online. EternalBlue is also one of the reasons why Microsoft disables SMBv1 (which is the EternelBlue object targeted) on the new OS.
Krypto Logic, which blocked WannaCry's rampage, said that WannaCry's remnants still use EternalBlue to find new victims, scan millions of millions on the Internet to find EternalBlue unpatched and untapped computers.
They can block WannaCry from encrypting the file but the EternalBlue vulnerability used to spread WannaCry is still working properly. There are machines that have not installed the patch, EternalBlue is still successful and is a threat.
See more: