I’m a little late to the party on this one. As many/most/all of you know, on Friday a group called Shadow Brokers published an enormously damaging tro
[See the full post at: Shadow Brokers and what the leaks mean to Windows users]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Shadow Brokers and what the leaks mean to Windows users
Home » Forums » Newsletter and Homepage topics » Shadow Brokers and what the leaks mean to Windows users
- This topic has 54 replies, 16 voices, and was last updated 8 years ago.
Tags: EternalBlue Shadow Brokers
AuthorTopicViewing 23 reply threadsAuthorReplies-
MrBrian
AskWoody_MVPApril 14, 2017 at 7:46 pm #108655From What Windows users need to know about the latest ‘ShadowBrokers’ exploits:
“We tested the leaked files on virtual machines running Windows XP, Windows 7, Windows Server 2012 R2 and Windows 8 Pro to see if they’re vulnerable. We also tested a local installation of Windows 10 Pro 64-bit. This is a quick list of what we found:
Windows 10 seems to be immune to the exploits leaked on April 14, 2017.
There are exploits that work 100 percent against Windows 7 with the April Service Pack.
There are exploits that work 100 percent against Windows Server 2012 R2 with the latest updates as of April 14, 2017.
There are exploits that work 100 percent against Windows XP with the latest updates.
Windows 8 Pro doesn’t grant full remote access when using these tools, but it isn’t immune and some slight variation of the code could make the OS vulnerable.” -
anonymous
Guest -
anonymous
GuestApril 15, 2017 at 3:06 am #108679@ MrBrian
Today, it made a new post that contained a number of working exploits for Windows machines running everything from XP up to at least Windows 8. As far as Windows 10, it appears that the stolen data is from 2013 and predates the latest OS.
It’s self-explanatory.
The NSA have likely, since 29 July 2015, been using newer exploits for Win 10 which may have yet to be leaked publicly by Shadow Brokers or other hackers.
Some people are even saying that Win 10 has inbuilt NSA spyware based on MS’s past collaboration/cooperation with the NSA in the PRISM spying program. -
Kirsty
Manager -
woody
ManagerApril 15, 2017 at 7:01 am #108747The quote’s from Richard Lawler’s piece in engadget. ‘Shadow Brokers’ dump of NSA tools includes new Windows exploits (updated)
Lawler just updated his piece to say:
Update (4/15): Microsoft responded early Saturday morning, saying that for the seven flaws leaked that affect supported systems — they’ve all already been patched. Of course, the story gets a bit more interesting from there, since it appears that four of them were only patched just last month, suggesting someone informed the company about the security issues before TSB could leak them.
There’s a whole lot of debate about what NSA knew, when they knew it, and whether/if/how they notified Microsoft that the apocalypse was coming.
-
-
-
-
anonymous
GuestApril 14, 2017 at 11:29 pm #108662From ‘Shadow Brokers’ dump of NSA tools includes new Windows exploits:
‘Contacted via email, Matthew Hickey expressed a similar outlook, saying that “most home users will not be directly impacted by these vulnerabilities as an attacker needs to connect to services on their computer. The risk is much bigger to enterprise and businesses who rely on these services to connect online.”‘
-
Kirsty
ManagerApril 15, 2017 at 1:05 am #108675http://www.bbc.com/news/technology-39553241
BBC published about the ShadowBrokers NSA Malware release on April 10th, saying
“Some cyber-security experts have said some of the malware is real, but old.”
https://medium.com/@d0znpp/analysis-of-the-eqgrp-leakage-a14bc92040d2
Ivan Novikov analysed the #EQGRP NSA leakage data, which shows 910 servers hacked around the world between 2000 and 2010.
http://www.bbc.com/news/technology-39606575
BBC published about the ShadowBrokers NSA tools leak on April 15th, saying
“… accompanying documents appear to indicate a possible breach of the Swift global banking system.
Such a hack could have enabled the US to covertly monitor financial transactions, researchers said.
If genuine, it represents perhaps the most significant exposure of NSA files since the Edward Snowden leaks in 2013.
Multiple experts have said this latest “data dump” is credible…
The files contained several “zero day” exploits – vulnerabilities that were previously unknown to the companies that create the software, or the security community at large.
… multiple experts said the sheer number of zero days released at the same time was unprecedented.
Microsoft said in a statement to the BBC that it was “reviewing the report and will take the necessary actions to protect our customers”.
”1 user thanked author for this post.
-
MrBrian
AskWoody_MVPApril 15, 2017 at 5:56 am #108711 -
MrBrian
AskWoody_MVPApril 15, 2017 at 6:19 am #108716Tweet from Microsoft employee:
“Removing/disabling SMB1 is encouraged. This is coming in the next OS release for many SKUs and editions http://aka.ms/stopusingsmb1 “
2 users thanked author for this post.
-
Noel Carboni
AskWoody_MVP -
anonymous
Guest -
MrBrian
AskWoody_MVP -
anonymous
Guest
-
-
Noel Carboni
AskWoody_MVPApril 15, 2017 at 7:47 pm #108894Do you have any XP systems on your LAN? I understand those might need SMB1 to see files / printers on the newer systems and vice versa.
Try disabling it and ensure all your systems can still communicate in the ways that you need them to. It can always be re-enabled.
-Noel
1 user thanked author for this post.
-
-
-
anonymous
GuestApril 15, 2017 at 10:28 am #1087741 user thanked author for this post.
-
woody
Manager
-
-
-
woody
ManagerApril 15, 2017 at 7:20 am #108753Here’s something interesting. Just a few hours ago, Tom Warren posted this on The Verge:
one security researcher, the grugq, claims that the NSA may have actually reported some of the bugs themselves. While Microsoft always acknowledges the source of security flaw reports, the grugq noticed there are no acknowledgements for patches (MS17-010) issued last month that fix some of the leaked NSA exploits. It’s possible that The Shadow Brokers or another group / individual tipped Microsoft to them in advance. Microsoft mysteriously delayed its Patch Tuesday release in February by a month in an unprecedented move, blaming a “last minute issue”. March’s Patch Tuesday included fixes for these leaked NSA exploits.
That qualifies as completely unsupported speculation… but it sure is worth chewing on. Fake news? Blazing insight? You choose.
-
MrBrian
AskWoody_MVPApril 15, 2017 at 7:31 am #108754Interesting in hindsight: Patch Tuesday put on hold, SMB zero-day exploit likely to blame (Feb. 15, 2017)
1 user thanked author for this post.
-
anonymous
Guest -
woody
Manager -
ht
AskWoody Lounger -
MrBrian
AskWoody_MVPApril 15, 2017 at 6:57 pm #108884From https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/:
“When using operating systems older than Windows 8.1 and Windows Server 2012 R2, you can’t remove SMB1 – but you can disable it: …”
For Windows 7, that involves these commands: https://pastebin.com/wnKyRR3W (source: https://support.microsoft.com/en-us/help/2696547/how-to-enable-and-disable-smbv1,-smbv2,-and-smbv3-in-windows-vista,-windows-server-2008,-windows-7,-windows-server-2008-r2,-windows-8,-and-windows-server-2012)
1 user thanked author for this post.
-
Ed
AskWoody LoungerApril 16, 2017 at 3:37 am #108933Win 7 x64 Ultimate & Professional here with a Homegroup set up that we both can use each other’s printers from. SMB1 doesn’t appear in the list on either one of them here either. I’ve never even heard of SMB1 before so obviously I didn’t disable it.
FWIW… Both of these systems are in Group B and I haven’t even installed the MARCH updates yet, so I can state for a fact that the MARCH Security Only Update didn’t remove it.
1 user thanked author for this post.
-
walker
AskWoody LoungerApril 16, 2017 at 12:42 pm #108972@Mr. Brian: I only have a very simple Win7 64 bit, OS which does not allow me to follow the instructions. I’m searching for s “super simple” instruction that I can understand and be able to follow. Thank you for what you posted, and hope that those who can understand everything will be “saved”. Thank you for posting….
1 user thanked author for this post.
-
-
-
-
-
BrianL
AskWoody LoungerApril 15, 2017 at 9:04 am #108760The NSA Spyware situation with MS has not changed. The only thing that changes is programs that NSA uses. Although I don’t know the paticulars: the NSA and Microsoft have an iron clad agreement that NSA has access to all MS servers. You can draw your own conclusions!
1 user thanked author for this post.
-
thymej
AskWoody Lounger -
MrJimPhelps
AskWoody MVPApril 17, 2017 at 9:38 am #109069the NSA and Microsoft have an iron clad agreement that NSA has access to all MS servers.
How do you know this?
If this is true, then imagine the implications of all of the telemetry data-collection by Microsoft. This could explain why they are collecting all of the data, from Windows 7 forward.
Group "L" (Linux Mint)
with Windows 10 running in a remote session on my file server
-
-
Microfix
AskWoody MVPApril 15, 2017 at 2:40 pm #108822Quite a worrying list here
I’m not convinced that Windows 10 is in the clear either since these exploits were stolen in 2013, before Windows 10 came out, so obviously it wouldn’t have been listed as a potential target.
Windows 10, it’s not like you have any privacy left to violate anyway!
Windows - commercial by definition and now function...1 user thanked author for this post.
-
BrianL
AskWoody LoungerApril 15, 2017 at 3:16 pm #108837NSA, in our present state of the world, can do what they want to, to protect us. Their intent is not to be disruptive to our computer uses. In fact I think that they have been doing this without causing any problems to us. We had no idea that this was going on for years, because it didn’t show up on our computers at all. I do think that with the boondoggle of the OS Windows 10, that NSA will have their work cut out for them. JUST MY THOUGHTS ONLY. Thanks for listening.
-
MrJimPhelps
AskWoody MVPApril 17, 2017 at 9:44 am #109070NSA, in our present state of the world, can do what they want to, to protect us. Their intent is not to be disruptive to our computer uses. In fact I think that they have been doing this without causing any problems to us
I know I’m edging dangerously close to a rant when I ask this, but are you sure you want Big Brother’s protection? Anytime the government can gather all of my personal information at will “for my protection”, I think we have a major problem on our hands.
If you consider the total loss of our privacy not to be a problem, then I suppose you could say that they haven’t been causing any problems to us.
Group "L" (Linux Mint)
with Windows 10 running in a remote session on my file server
-
-
Anonymous
InactiveApril 15, 2017 at 9:04 pm #108896Windows 7 fight against windows 10, This picture say more about what is going on in the digital world than i can say with words. Most people know the story about David`s fight against Goliat. ( If not you should read it ) … The deal in this fight was this : If david (W7) loose the fight, then all the people had to surrender and be a slave to Goliat (W10)
To me Woody is a fighter like David… Thank you Woody !
1 user thanked author for this post.
-
_Reassigned Account
AskWoody LoungerApril 16, 2017 at 7:23 am #108951The really big deal is that these tools leaked into the wild to begin with. Because it looks as though at least with Windows 10 users have been patched if indeed users actually installed the updates. Of course it always get’s murkier as you go back in time with Windows versions. Windows has always suffered from being a target just because of the vast numbers of PC’s running Windows. But even with Windows 10 being more secure than any previous version. I am skeptical and how much improvement is really there? Especially now that we have Windows 10 sending telemetry and other data back and forth to servers. Even if you trust Microsoft the questions remain on how well this telemetry is protected, where is it stored and what kind of potential does it hold for hackers?
1 user thanked author for this post.
-
MrBrian
AskWoody_MVPApril 16, 2017 at 7:26 am #108952For people who normally never update Windows, you may wish to consider making an exception and install the March 2017 security-only update. If you don’t do so, malware on other devices in your local network could cause your computer to get malware due to issues mentioned in MS17-010.
1 user thanked author for this post.
-
walker
AskWoody LoungerApril 16, 2017 at 12:38 pm #108971What are we going to do to try to stay safe? If someone could write some directions for those of us who are ” computer illiterate” (just simple Win7 64 bit) to follow I think we could manage to do it (???) We need HELP, and we need it fast. Any and all advice will be very much appreciated. It only gets worse and worse.
1 user thanked author for this post.
-
MrBrian
AskWoody_MVPApril 16, 2017 at 1:47 pm #108986 -
walker
AskWoody LoungerApril 16, 2017 at 3:30 pm #108995@Mr.Brian:
Thank you so much for the supporting information about it not being necessary to disable SMB1. I’m so thankful that I’m up-to-date with the March updates. What a HUGE relief! Your expertise and assistance is outstanding, and appreciated more than words can express. Thank you once again for your invaluable assistance. Truly wonderful!
-
-
-
MrBrian
AskWoody_MVPApril 16, 2017 at 1:48 pm #108987 -
anonymous
GuestApril 16, 2017 at 4:59 pm #109001Detecting SMB Covert Channel (“Double Pulsar”)
Published: 2017-04-16
Last Updated: 2017-04-16 18:58:10 UTC
by Johannes Ullrich (Version: 1)…
With Friday’s release of additional Shadowbroker tools, a lot of attention was spent on exploits with names like “Eternalblue”, which exploited only recently patched vulnerabilities. Another item of interest however, is the command and control channel used to communicate with systems post exploitation…Simple example usage pre and post-exploit:
root@kali:~# python detect_doublepulsar.py --ip 192.168.175[.]128 [-] [192.168.175[.]128] No presence of DOUBLEPULSAR root@kali:~# python detect_doublepulsar.py --ip 192.168.175[.]128 [+] [192.168.175[.]128] DOUBLEPULSAR DETECTED!!!
-
anonymous
GuestApril 16, 2017 at 5:27 pm #109003Resource for installing python on Windows.. perhaps not just for this use and definitively not a suggestion for a VPN.. I needed python. You can skip steps 1,2,5. You just need ‘Python’ and “Install Microsoft Visual C++ Compiler for Python 2.7 VCForPython27”.
The instructions are so very simple.
Since I already had “python27” installed, it was only a matter of using Notepad++ 7.3.3 (Thanks Crysta!) to paste the raw script from Github and saving it to
C:\python27\scripts
Command prompt admin; navigate to the folder above and runC:\Python27\Scripts>detect_doublepulsar.py --ip 10.10.254.5 [-] [10.10.254.5] No presence of DOUBLEPULSAR
-
-
AlexEiffel
AskWoody_MVPApril 17, 2017 at 12:07 am #109031This is an example of why I don’t think W is a great path for people who care a lot about security if they don’t take other measures and have their computers among other less safe ones on the same network . If your teen’s gaming computer gets infected and you are a careful group W user, issues similar to this one could bite you, even if you are careful browsing the web, as the virus would spread automatically from the teen computer to yours with no intervention other than turning on your computer.
I have been deactivating SMB 1 since many years ago. It will create issues if you do file sharing on the network with XP or some old Linux or NAS if you have one, but it is an old insecure protocol and is only there for legacy reasons. You might not be seen on the network by other XP computers if you disable it. But do you need that? Maybe try it while being aware of the potential issues and if it doesn’t work for you, you can simply turn it on again? I also always remove all network protocols except Ipv4 and QoS and I don’t do file sharing on the local network in the house. I don’t do printer sharing either, I just install the printer on each computer. Yes ch100 said to leave IPv6 on, but I used the registry to disable it anyway so I don’t think it matters but you could leave it on. I don’t use homegroups or anything and I try to run lean in terms of network procotols exactly for the reason that when a vulnerability is discovered, it can spread very easily by just having your laptop plugged anywhere in a public place, although now if you select public, MS deactivates lots of them on the public network, which is good. Any laptop I configure only gets Ipv4 and QoS and they work fine like that.
Folks behind a router, don’t panic too much although it is true if a device on your local network is infected, it could easily spread to you because you likely didn’t disable the sharing protocols for private networks.
3 users thanked author for this post.
-
woody
ManagerApril 17, 2017 at 6:34 am #109045Sadly, I think you’re right.
We’re seeing “Group W” disappear, with these releases and the Word 0day.
Unfortunately, these are widespread security holes, and folks will have to patch them sooner or later – or get bit.
5 users thanked author for this post.
-
Noel Carboni
AskWoody_MVPApril 17, 2017 at 6:39 am #109047What’s dismaying is that these holes have been built into the software forever, yet once found and exploited the whole thing becomes an emergency.
Would you think to lay off your professional testing staff in a world like that? Yet that’s precisely what Microsoft has done.
I wonder how many vulnerabilities they’re building into their new code on purpose.
-Noel
3 users thanked author for this post.
-
anonymous
GuestApril 18, 2017 at 5:14 am #109205
-
-
-
MrBrian
AskWoody_MVPApril 17, 2017 at 7:10 am #109048Great post :).
I want to clarify a few things:
1. If you’re a home Windows user, and you didn’t apply the March 2017 patches and perhaps some of the other patches listed at https://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-risk/ (or are using an affected but unsupported-by-Microsoft Windows version), AlexEiffel’s scenario in the first paragraph (“teen’s gaming computer gets infected”) is your reality now.
2. AlexEiffel’s last paragraph is referring to the possibility that similar unpatched vulnerabilities (if they exist) can be exploited if mitigation steps are not taken. (Correct me if I am wrong.)
1 user thanked author for this post.
-
anonymous
GuestApril 17, 2017 at 7:28 am #109050@ AlexEiffel
For Win 7/8.1 users,
Group W or C = may get hit by the Word 0-day exploit.
Group A or B = may get hit by Windows Update processor-block.Will there be a Group D for affected Win 7/8.1 users to escape from the clutches of both hackers and MS ?
1 user thanked author for this post.
-
AlexEiffel
AskWoody_MVPApril 17, 2017 at 11:00 pm #109183Alas, that is why I don’t believe W is a good strategy in the long term. The risk might be worth taking it for some, but nobody can say W is a safe strategy. Of course, nothing is safe, but I would just go to 10 then or complain louder. You can hope that companies will voice their discontent loud enough to make MS back off when they replace old computers that breaks but they are not ready for 10.
Group D would be security only except processor blocking security patches, so it would be less bad than W, but for that to work, the security patches would have to be non cumulative.
-
MrBrian
AskWoody_MVPApril 17, 2017 at 11:04 pm #1091841 user thanked author for this post.
-
-
-
anonymous
Guest -
woody
Manager
-
-
anonymous
Guest -
anonymous
GuestApril 18, 2017 at 2:13 am #109204Those wearing tinfoil hats care about the NSA exploits. If you’re just some joe-schmoe on the planet then keep {quiet}, no one cares about your information.
This is a perfect example of NSA doing their job, since just about everyone from every country uses some type of OS. NSA needs tools to infiltrate and gather information on the watch list.
-
MrBrian
AskWoody_MVPApril 21, 2017 at 7:02 pm #110083From >10,000 Windows computers may be infected by advanced NSA backdoor:
“Security experts believe that tens of thousands of Windows computers may have been infected by a highly advanced National Security Agency backdoor. The NSA backdoor was included in last week’s leak by the mysterious group known as Shadow Brokers.”
-
JohnW
AskWoody LoungerApril 22, 2017 at 11:11 am #110182From >10,000 Windows computers may be infected by advanced NSA backdoor: “Security experts believe that tens of thousands of Windows computers may have been infected by a highly advanced National Security Agency backdoor. The NSA backdoor was included in last week’s leak by the mysterious group known as Shadow Brokers.”
Check your port 445 here … http://ismyportopen.com/
Windows 10 Pro 22H2
1 user thanked author for this post.
-
MrBrian
AskWoody_MVPMay 18, 2017 at 12:26 am #116051From Fearing Shadow Brokers leak, NSA reported critical flaw to Microsoft:
“After learning that one of its most prized hacking tools was stolen by a mysterious group calling itself the Shadow Brokers, National Security Agency officials warned Microsoft of the critical Windows vulnerability the tool exploited, according to a report published Tuesday by The Washington Post. The private disclosure led to a patch that was issued in March.”
Viewing 23 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
MS Office 365 Home on MAC
by
MickIver
53 minutes ago -
search by picture an not all that’s cracked up to be (Awaiting moderation)
by
Dru Fuksa
5 hours, 50 minutes ago -
Google’s Veo3 video generator. Before you ask: yes, everything is AI here
by
Alex5723
12 hours, 56 minutes ago -
Flash Drive Eject Error for Still In Use
by
J9438
14 hours, 29 minutes ago -
Windows 11 Insider Preview build 27863 released to Canary
by
joep517
1 day, 7 hours ago -
Windows 11 Insider Preview build 26120.4161 (24H2) released to BETA
by
joep517
1 day, 7 hours ago -
AI model turns to blackmail when engineers try to take it offline
by
Cybertooth
11 hours, 28 minutes ago -
Migrate off MS365 to Apple Products
by
dmt_3904
12 hours, 17 minutes ago -
Login screen icon
by
CWBillow
2 hours, 39 minutes ago -
AI coming to everything
by
Susan Bradley
10 hours, 15 minutes ago -
Mozilla : Pocket shuts down July 8, 2025, Fakespot shuts down on July 1, 2025
by
Alex5723
1 day, 23 hours ago -
No Screen TurnOff???
by
CWBillow
1 day, 23 hours ago -
Identify a dynamic range to then be used in another formula
by
BigDaddy07
2 days ago -
InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords
by
Alex5723
2 days, 11 hours ago -
How well does your browser block trackers?
by
n0ads
1 day, 22 hours ago -
You can’t handle me
by
Susan Bradley
22 hours, 15 minutes ago -
Chrome Can Now Change Your Weak Passwords for You
by
Alex5723
1 day, 14 hours ago -
Microsoft: Over 394,000 Windows PCs infected by Lumma malware, affects Chrome..
by
Alex5723
2 days, 23 hours ago -
Signal vs Microsoft’s Recall ; By Default, Signal Doesn’t Recall
by
Alex5723
2 days, 2 hours ago -
Internet Archive : This is where all of The Internet is stored
by
Alex5723
2 days, 23 hours ago -
iPhone 7 Plus and the iPhone 8 on Vantage list
by
Alex5723
2 days, 23 hours ago -
Lumma malware takedown
by
EyesOnWindows
2 days, 12 hours ago -
“kill switches” found in Chinese made power inverters
by
Alex5723
3 days, 8 hours ago -
Windows 11 – InControl vs pausing Windows updates
by
Kathy Stevens
3 days, 8 hours ago -
Meet Gemini in Chrome
by
Alex5723
3 days, 12 hours ago -
DuckDuckGo’s Duck.ai added GPT-4o mini
by
Alex5723
3 days, 12 hours ago -
Trump signs Take It Down Act
by
Alex5723
3 days, 20 hours ago -
Do you have a maintenance window?
by
Susan Bradley
2 days, 1 hour ago -
Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms
by
Nibbled To Death By Ducks
2 days, 22 hours ago -
Cox Communications and Charter Communications to merge
by
not so anon
4 days ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.