{"id":16914,"date":"2019-06-10T15:45:50","date_gmt":"2019-06-10T19:45:50","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=16914"},"modified":"2019-06-10T15:45:51","modified_gmt":"2019-06-10T19:45:51","slug":"bluekeep-warning-issued-by-microsoft","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/bluekeep-warning-issued-by-microsoft\/","title":{"rendered":"BlueKeep Warning Issued by Microsoft"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 28pt;\">BlueKeep Warning Issued by Microsoft<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Much like the NSA-authored worm that stolen by hackers, modified and foisted upon Internet users in the form of the WannaCry worm that infected hundreds of thousands of computers back in 2017, a new NSA worm called EternalBlue was stolen by a hacking group known as the Shadow Brokers and is set to be unleashed upon unpatched Windows\u00a0 7 (and older versions of Windows ) computers as the BlueKeep worm.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The BlueKeep worm is a Remote Desktop Services Remote Code Execution Vulnerability. In plain English, that means it&#8217;s a security vulnerability present in Windows machines that can be exploited remotely without the knowledge of the computer&#8217;s owner. Just as concerning, BlueKeep can self-replicate and infect multiple machines on a network and this includes machines connected to the Internet. Microsoft says that BlueKeep is a critical vulnerability that needs to be addressed immediately.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">BlueKeep does not affect Windows 8, 8.1 or Windows 10 users. But if you&#8217;re using Windows 7 (or older versions of Windows) your computers are vulnerable and exploitable. So, Heads up! Make sure you have the latest Windows updates and security patches. This might just be only the beginning for the increasingly vulnerable Windows 7 operating system. If you&#8217;re using Windows 7,\u00a0 it&#8217;s a good time to consider upgrading to Windows 10.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">To learn more about BlueKeep and the Windows vulnerability,<span style=\"text-decoration: underline;\"> <a href=\"https:\/\/is.gd\/jXqDg6\" target=\"_blank\" rel=\"noopener noreferrer\">read the following article from the HIPAA Journal:<\/a><\/span><\/span><\/p>\n<blockquote>\n<h2><span style=\"font-family: helvetica, arial, sans-serif;\">Fresh BlueKeep Warning Issued by Microsoft: Public Exploits Exist and Attacks Imminent<\/span><\/h2>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Microsoft has issued a fresh warning about the recently discovered BlueKeep vulnerability in Remote Desktop Services (CVE-2019-0708) following the online publication of proof-of-concept exploits for the flaw.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Microsoft released fixes for the flaw on May 14, 2019. As was the case with the vulnerability that was exploited in the WannaCry ransomware attacks in 2017, patches were also released for unsupported Windows versions.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The vulnerability is critical and could be exploited remotely via Remote Desktop Protocol (RDP) without any user interaction required. As one security researcher has shown, finding devices that have not been patched is far from difficult. Robert Graham of Errata Security performed a scan of the internet and found almost 1 million devices that have still not had the patch applied or protected using Microsoft\u2019s recommended mitigations. Graham is not the only person to have performed scans for vulnerable devices. There has been a major increase in scans in recent days. It appears that cybercriminals are preparing for attacks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The fresh warning is an unusual step for Microsoft to take. It has satisfied its obligations through the release of patches and has even issued patches for unsupported Windows versions. The decision to release a further warning was due to the growing risk of exploitation of the vulnerability. Several security firms claim to have developed exploits for the flaw and proof-of-concept exploit code has now been leaked online. Microsoft is confident that viable exploits exist for the vulnerability&#8230;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The latest flaw does not affect Windows 8 and Windows 10, but older Windows versions \u2013 Windows XP, Windows 7, Windows 2003 and Windows Server 2008 \u2013 are vulnerable. Many businesses have upgraded to Windows 10, but legacy Windows operating systems are still extensively used in healthcare, at least on some devices.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The advice from Microsoft has not changed. \u201cWe strongly advise that all affected systems should be updated as soon as possible,\u201d said Pope. \u201cIt only takes one vulnerable computer connected to the internet to provide a potential gateway into these corporate networks, where advanced malware could spread, infecting computers across the enterprise.\u201d<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The NSA has also issued an alert via its Central Security Service division in an attempt to prevent another global malware attack like WannaCry, which used the NSA-developed EternalBlue exploit.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><em><a href=\"https:\/\/is.gd\/aRJpoM\" target=\"_blank\" rel=\"noopener noreferrer\">Source &#8220;HIPAA Journal&#8221;<\/a><\/em><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; BlueKeep Warning Issued by Microsoft Much like the NSA-authored worm that stolen by hackers, modified and foisted upon Internet users in the form of the WannaCry worm that infected hundreds of thousands of computers back in 2017, a new NSA worm called EternalBlue was stolen by a hacking group known as the Shadow Brokers and is\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/bluekeep-warning-issued-by-microsoft\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":14573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1678,1669,2509,1426,1670,1682,1656,1674,779,10,2366],"tags":[3229,3230,14,90,3228,7,3227,6,5,1519],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/16914"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=16914"}],"version-history":[{"count":6,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/16914\/revisions"}],"predecessor-version":[{"id":16920,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/16914\/revisions\/16920"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/14573"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=16914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=16914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=16914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}