Connect with us

Hi, what are you looking for?


Endpoint Security

EternalBlue-Vulnerable Systems Serially Infected

Windows machines that haven’t been patched against the National Security Agency-linked EternalBlue exploit are stuck in an endless loop of infection, Avira warns.

Windows machines that haven’t been patched against the National Security Agency-linked EternalBlue exploit are stuck in an endless loop of infection, Avira warns.

The EternalBlue exploit, which the Shadow Brokers hacking group stole from the NSA-linked Equation Group, is best known for its role in the WannaCry outbreak last year.

The ransomware hit mostly Windows 7 and Windows XP machines, and for good reason. Its spread mechanism was targeting a vulnerability in Windows’ Server Message Block (SMB) on port 445, which mainly impacted those platform iterations.

The exploit was made public a month after Microsoft released a patch for the vulnerability it targets, but hundreds of thousands of systems continue to be vulnerable today, Avira says. An emergency patch was also released for Windows XP.

The unpatched systems remain exposed to any malware that abuses the EternalBlue exploit and, as Avira senior virus analyst Mikel Echevarria-Lizarraga points out, many of these systems are serially infected.

“There are still significant numbers of repeatedly infected machines more than a year after WannaCry. […] Our research has linked this to Windows machines that haven’t been updated against the NSA Eternal Blue exploit and are an open target for malware,” he says.

The number of unpatched systems, he reveals, is very high, but there’s an explanation for that. Many of the systems that have been infected multiple times were found to run activation cracks. This means that they did not receive Microsoft’s patches.

Without the official patch, users should turn off the older SMB1 protocol entirely on these machines to stay protected, the security researcher says.

Advertisement. Scroll to continue reading.

Avira says they decided to take this security measure on the machines they found to be missing the patch and that this led to the discovery of around 300,000 computers affected by the issue.

Avira says they are deactivating the vulnerable protocol on around 14,000 systems each day and that the protective measure appears to be paying off.

“The strategy is working. Once the SMB1 protocol is deactivated, we don’t see the same machines affected again and again with this problem,” he says.

The top 10 impacted countries, Avira reveals, are Indonesia, Taiwan, Vietnam, Thailand, Egypt, Russia, China, Philippines, India, and Turkey. The numbers are in line with the findings of studies from Statista on the use of unlicensed software, Avira’s Lyle Frink says.

According to these studies, the unlicensed software rates are of around 52 – 60% outside the United States and the European Union. In these areas, the rates are of only 16% and 28%, respectively.

“Unlicensed software is usually unable to get the latest patches against vulnerabilities such as EternalBlue,” Frink underlines.

Related: One Year After WannaCry Outbreak, EternalBlue Exploit Still a Threat

Related: NSA-Linked Implant Patched to Work on Windows Embedded


Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...


A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.