TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

SambaCry: The Linux Sequel to WannaCry

2017-05-26 · Read original ↗

ATT&CK techniques detected

7 predictions
T1021.002SMB/Windows Admin Shares
91%
“restarting smbd fixes the issue. - adding the line " nt pipe support = no " to the smb. conf file and restarting smbd will also stop attackers from being able to exploit this vulnerability, but this can disable some expected functionality for windows clients of the vulnerable sam…”
T1210Exploitation of Remote Services
83%
“##5 open to the internet while many of these may be running patched versions, have selinux protections, or otherwise don ' t match the necessary criteria for running the exploit, the possible attack surface for this vulnerability is large. because exploit code is available, and t…”
T1210Exploitation of Remote Services
77%
“smb. conf - the attacker must have access to a writeable share notably, the attacker does not have to have authenticated access if they can write to the writable share anonymously. in order to exploit the vulnerability, the attacker would upload a shared object file to the writea…”
T1210Exploitation of Remote Services
58%
“' s no doublepulsar back door piece to this just yet, but working exploit code for metasploit4 was released publicly over 24 hours ago, so expect it to be weaponized quickly. how bad is it, really? samba is an open source network application that provides the same functionality a…”
T1021.002SMB/Windows Admin Shares
54%
“' s no doublepulsar back door piece to this just yet, but working exploit code for metasploit4 was released publicly over 24 hours ago, so expect it to be weaponized quickly. how bad is it, really? samba is an open source network application that provides the same functionality a…”
T1021.002SMB/Windows Admin Shares
50%
“sambacry : the linux sequel to wannacry samba. org, which distributes samba open - source software that provides windows file sharing access to non - windows machines, just disclosed a critical remote code execution vulnerability1 that has existed for 7 years. that number was jaw…”
T1210Exploitation of Remote Services
36%
“sambacry : the linux sequel to wannacry samba. org, which distributes samba open - source software that provides windows file sharing access to non - windows machines, just disclosed a critical remote code execution vulnerability1 that has existed for 7 years. that number was jaw…”

Summary

With simple exploits plaguing Windows and Linux SMB week over week, do yourself a favor and patch for CVE-2017-7494 now to avoid having to do it in panic mode.