BlueKeep a million vulnerable Windows computers

Nearly a million Windows PCs are vulnerable to BlueKeep, a loophole in the Remote Desktop Protocol (RDP) service that affects older versions of the Windows operating system.

This figure comes to restrict the initial fears that more than seven million devices were in danger, although the risk continues to exist, as one million devices are not funny.

BlueKeep

Η , to which the attribute has been given CVE-2019-0708, has been working with computer and cyber security communities in the last two weeks.

The problem occurred at 2019 May May Patch, earlier this month.

Microsoft then released the security updates but he warned that because BlueKeep's flaw is a worm, which means that hackers and malicious software might potentially abuse the vulnerability to double the casualties after the worm spreads itself substantially.

As with the EnternalBlue SMB during the WannaCry, NotPetya the 2017.

However, despite the level of risk of vulnerability, there have been no attacks, mainly because there is no public PoC, which can be adapted to attack.

Certain scans have been observed, but it is not clear who is behind them, according to security firm GreyNoise, who noticed the weekend activity.

The good news is that can immediately apply repairs to mitigate this risk. The updates are currently in circulation and are available for Windows XP (!), 7, Server 2003 and Server 2008, all versions of Windows that are vulnerable to BlueKeep attacks.

BlueKeep windows

In the research published today, Robert Graham, head of Errata Security security research firm and Internet Masscan Scanner Programmer, has revealed accurate statistics on the number of Windows systems that are still vulnerable to BlueKeep attacks.

While initially believed that there are almost 7,6 million Windows systems that are connected to the Internet and vulnerable to attacks, Graham said today that the number is actually around at 950,000.

Most of the seven million systems that have 3389 ports (RDP exposed on the Internet are not actually Windows systems or some RDP service on this door, as Graham discovered.

The researcher reported that the majority of Windows systems with an RDP service exposed directly to the internet are s, since there are around 1,5 million such devices that respond to scans in a specific way.

Hackers are likely to start intense attacks next month and cause havoc on these machines

In addition, due to the limitations of his shots, Graham was unable to test Windows systems on internal networks, which most likely hide most vulnerable computers.
The tool that Graham used during his research is available at GitHub named rdpscan. This is a mix of its own masscan tool and a BlueKeep scanner set was developed by RiskSense.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).