Damn, people are still using SMB??
Hackers* have improved the reliability and potency of Server Message Block (SMB) exploits used to carry out the hard-hitting NotPetya ransomware attack last year. EternalBlue, EternalSynergy, EternalRomance and EternalChampion formed part of the arsenal of NSA-developed hacking tools that were leaked by the Shadow Brokers …
I thought these attack vectors were obsolete as the OS's they ran on.
Clearly these guys think it's enough of a thing to make their time and trouble worthwhile.
So what do they know that we don't?
Hackers, including those who are not named John, Johnnie, Janelle or Jonah, have improved the reliability and potency of Server Message Block (SMB) exploits ... John Leyden
In early type Bletchley Park Huts and current running Cheltenham Doughnut StationsAre hackers improving the reliability and potency of exploits crack coders and code crackers?
It is strange though how working diligently in the private sector at the leading cutting edge of new vital ubiquitous technologies with disruptively creative methodologies can have one so crassly classified Renegade Rogue and Jolly Rogering Pirate.
Both Xerox MFP Printer and Fiery RIPS are still selling printer solutions that rely on SMBv1 for scan to PDF files. The only way to allow this feature is to leave SMBv1 ON your server share. I have complained to both Xerox and Fiery and their reply is it's not a priority. Apparently, all Fiery RIPs for Postscript printing rely on SMBv1.
Biting the hand that feeds IT © 1998–2020