An American cyber security company sells BlueKeep exploit as part of a penetration testing application.
The BlueKeep vulnerability, also known as CVE-2019-0708, is a Remote Desktop Protocol (RDP) security vulnerability that is included in earlier versions of Windows.
Microsoft has released security patch updates BlueKeep on 14 May and described it as a "worm" that could spread in the same way that it spread EternalBlue and helped to promote his ransomware outbreak WannaCry.
The vulnerability has been considered extremely dangerous since it was first discovered and Microsoft has he says repeatedly the necessity of updates in all systems.
Even the US National Security Service (NSA), the US Department of Homeland Security, the German BSI Cyber Security Service, the Australian Cyber Security Center, and the UK's National Cyber Security Center have issued security warnings that encourage users and companies to update earlier versions of Windows.
Over the past two months, security researchers have not detected any exploit of BlueKeep online.
Several security companies, however, managed to develop exploits for BlueKeep, but declined to release a PoC because it could be used for malicious purposes, and in global attacks that would resemble WannaCry attacks.
However, on Tuesday July 23, Immunity Inc. announced it has added a fully operational BlueKeep exploit within CANVAS v7.23, a penetration testing tool developed by the company.
In the past, many BlueKeep exploits have been uploaded to GitHub that could hit Windows remote systems if they had RDP open and exposed on the Internet.
CANVAS BlueKeep module of Immunity can achieve remote code execution ie to open a shell on infected computers.
Although CANVAS licenses cost tens of thousands of dollars of tens of thousands of dollars, hackers are known to use pirated copies. Of course there are others who legitimately buy penetration testing tools (eg Cobalt Strike).
This is the first time a BlueKeep exploit has been released, albeit to a very limited audience. However, those who can afford it will not be few. Criminals will be able to find funding from other illegal activities, and of course there are intelligence services, in which case "there is money."
If you have not yet updated your systems, you can do so from here.
______________________
- Equifax 20.000 to every person who leaked his data
- ICS Forth more about the hack of Greek domains gr & el
- Facebook Libra: command to stop the project
- Personal Vault OneDrive Encrypted Case from Microsoft