Category Archives: Eternal Blues

Eternal Blues – stats explained

In just a month or so, scans taken by Eternal Blues users around the world from 163 countries, over 21 million scanned IPs, 875K hosts still use SMBv1. More than 17K networks had at least one EternalBlue vulnerable host. 134K identified as vulnerable to EternalBlue.

High level stats

If we take the top 6 countries, where Eternal Blues was vastly adopted – we observe that Russia, Spain, United States and France scanned over 2M IPs each. Ukraine and Germany have scanned over 1M IPs solely.


163 countries. No, I did not see this coming when I first made this tool available.


We can see the average status of a network is 1 vulnerable host out of 9. This is quite surprising.


Taking a look at the vulnerability ratio edges (of countries with at least 2,000 scanned hosts), we observe countries with 1 vulnerable host out of 4-5 hosts in worst case, while best case is 1 vulnerable hosts out of 20-30 hosts, which is still pretty bad if you ask me.


Needle in a haystack

My favorite view. It perfectly shows the great value of this tool: IT/Security teams are having hard time knowing if their network is fully patched –

One network scan taken from France, had only 2 vulnerable hosts, out of a network of almost 10,000 hosts. This is almost mission impossible finding this ‘needle’. Another example is a network scan taken from Saudi Arabia, with only one vulnerable host out of almost 4,800 active hosts. This is insane.


Besides, organizations which scanned their network with Eternal Blues, are by definition, well aware to the fact they may have some blind spots. I initially aimed this tool for small-medium business, but it was greatly adopted by enterprises as well. 11K-host-scan, 10K-host-scan, 9K-host-scan, lots of 4K-host-scans just demonstrate this was in use by enterprises.

Another cool piece of information – one network scan ended up with 1,351(!) vulnerable hosts. One scan. 1,351 vulnerable hosts?? This reminds me this one time my fridge was so full, I decided to look for expired products, so I can make some room. I ended up with just water in my fridge 😐


SMBv1 view

Most of the hosts out there still use SMBv1 (seriously guys). One of my favorite tweets, by Ned Pyle, Principal PM @ Microsoft:

If you think you’re safe ‘cause you patched all your systems, think again. A great research taken by Sean Dillon and Jenna Magius, discovering SMBLoris, demonstrates yet another devastating vulnerability with SMB.

Read more about the risk with SMBv1 in a great article posted by Lucian Constantin in Forbes Magazine.


Final words

Eternal Blues was a great experience. Both helping users worldwide and also, hopefully, helps the security ecosystem understand the current posture of the EternalBlue vulnerability and how often you can  find a host with SMBv1 still enabled (every other host).

You should always keep in mind these statistics are collected from users who scanned using Eternal Blues. Meaning –

  • Fixed numbers (e.g. how many vulnerable hosts) are much (much) higher
  • Statistics numbers (e.g. 1 out of 9 host is vulnerable) show less vulnerable status than it really is. Although stats represent ~1.4M real hosts, you should always keep in mind the networks got scanned were networks where someone had some awareness to the problem…

You can always access (and share) the up to date analytics below (or in full screen):


For me, I’m going to have less focus on this project from now on. It will still be available to download in the meantime, but my focus is already on my next challenge 😉

 For a safer world!

Eternal Blues – Worldwide Statistics

Finally, 2 weeks post launch, some worldwide statistics.

August 7, 2017 update: stats explained

But before you start, here are some useful tips:

  • Read FAQ below
  • Hover data to see some extra detailed tool-tips
  • Click data for dynamic filtering
  • CTRL+click for multi-select
  • Hit the full screen button below and enjoy 😉

Words out. Visualizations in.

(Continue in full screen)


Please share your feedback – your results, how it helped you – in twitter or just as comments below. If you have more ideas for cool visualizations, just let me know. Need to ask something privately? you can email me or make contact through LinkedIn.


Some surprising facts (July 12, 2017)

  • More than 8 million IPs were scanned. France taking the lead with 1.5 million
  • The top 3 vulnerable countries (out of ~130), had more than 30,000 vulnerable hosts altogether
  • The majority (53.82%) of hosts nowadays still have SMBv1 enabled
  • 1 out of 9 hosts in a network is vulnerable to EternalBlue
  • One network, with almost 10,000 hosts (not IPs), had 2 vulnerable hosts. How could anyone find that without Eternal Blues?



Unfortunately, exploitation of EternalBlue is still a very good method of invoking remote code execution. It is available in more than 50,000 hosts scanned by Eternal Blues (as for July 12, 2017). Yes, even after all the latest attacks by WannaCry and NotPetya. I’m here to remind you, sometimes it takes just 1 vulnerable machine to take you down.

Although numbers are quite high (remember, these are IPs scanned with my tool only), I feel like awareness did increase somewhat. Running Eternal Blues is, by definition, being aware of the problem. So good for you for taking responsibility and checking your network status. Now it’s patching time!



Please, don’t be mistaken – recent ransomware attacks are the ones that made all the buzz, since they actually tell you when they hit you. I believe there are many more EternalBlue-based attacks which remain off the radar and are still unknown to us (examples: data exfiltration or even just using your computers to join a botnet). So not seeing something like this (below), does not mean you weren’t hit…



  • Is ‘IP’ == ‘Host’?
  • No. IP is IP address. It may be in use and may not
  • Can someone hack your data and see our personal data?
  • First, everything is hack-able. Second, there is no personal data to hack.  In fact, I’ve just made it available online with the Power BI dashboard above, so, no need to hack, it’s all here! 😀
    As for what’s being collected and why there is no privacy issue, read Privacy & Reporting
  • Are there any duplicates?
  • Yes. Since I don’t track users/hosts, I cannot know if a user scanned the same network twice
  • So, total results should be lower than mentioned?
  • Actually quite the opposite. There are many cases which makes me believe the total results number is actually higher:
    • Versions included a detection issue (as mentioned here). So in order not to have even the slightest mistake with statistics, I decided to exclude all collected results from these versions (meaning, scans of 1 million IPs were completely dismissed)
    • Some scans were taken on more secured environments where there is no internet access. Meaning, no statistics for me
    • Some users probably disabled access to my website in order not to send statistics
  • Can I use these visualizations in my website / presentations?
  • Sure. Letting me know how/where it helped you can be great
  • Are visualizations, or the data they’re based on, going to be updated?
  • Yes. At least twice a week

Eternal Blues – Versions & Reporting


Version Date Size Notes SHA-256 (latest) July 25, 2017 886 KB Increased timeout (for slow networks)

Removed “Are you sure” button before exit

7f5f447fe870449a8245e7abc19b9f4071095e02813d5f42c622add56da15b8b July 10, 2017 1.43 MB Added host name column for better analysis 21cc36e60e661613f0c05e73b9496bf2d456931686b0693112842d91d7e64e78 July 6, 2017 1.43 MB Some GUI fixes 7a08f7010402e2813830c77be1e992f6193f5c1ea97b76fbe706c2090ba66cb3 July 3, 2017 1.42 MB Some GUI fixes 1e6fc5078edd00a8ecedcbd2e2054a769610bfacce81b22f1285a7e14dbeacb0 July 2, 2017 1.42MB Vulnerability detection fix 952feb69a311e0a7602b65b0e981364bc2f0d79bb7af79ea342234c28b6df099 June 29, 2017 1.42MB First versions N/A

Privacy & Reporting

Anonymous statistics are being sent to every time Eternal Blues starts a scan or when it is finished. Your privacy is a top concern of mine.

Below described the information being collected  (each new version includes all the previous collected data) –

    • Eternal Blues version
    • Random ID
      • Generated with each new launch of the application. It is used for my own debugging – to see if a scan started but did not end (or ended with different number of hosts). Launching twice by the same user/host will result with a different random number
    • # of scanned IPs
    • # of vulnerable IPs
    • # of responsive IPs
  • and later
    • # of IPs with SMBv1 enabled

Some other metadata is being appended by default with Google Analytics, like time of scan & country.

I don’t know about your IP, don’t care about it and frankly, quite glad not to know anything about it in order to completely eliminate any unnecessary privacy/legal issues.

What’s not being collected?

User names, host names, IP addresses, domain name. It is really none of my interest.
Two scans taken by the same user & computer cannot be correlated (the only common data is the fact they share the same country)

Why collecting data at all?

Understanding how the world’s EternalBlue vulnerability (and SMBv1) posture really looks like, is a great interest to me and actually to many more in the cyber security ecosystem. I doubt if anyone has good visibility for that. Not sure even if Microsoft really knows the average ratio of hosts with SMBv1 enabled in a standard network is.

Stats are coming soon.
July 10 teaser: More than 7 million IPs were scanned so far. PowerBI is coming…

Here they are 😉

Eternal Blues – Day 4 (important update)

It’s been quite a day. More than 2,000 scans in the past 24 hours and over 6,000 in total.


My first priority for today was fixing the reported issues (I actually took a day off work). There were some scenarios of wrong detection – it mainly happened with Windows 2003, but are likely to reproduce with other versions as well (the issue was reading 2 overridden bytes). I can’t know the exact likelihood of reproduction, but I roughly estimate it with probability of 1%-3% – which means approximately 2-8 hosts out of the default 256 hosts scan. If only half of these IP are in use, it’ll be 1-4 hosts with chances of result mismatch.

Therefore, people who scanned with version or earlier:
I encourage you to take another scan with the latest version . Thankfully, a few people made contact and reported about these mismatches on day 2. They’ve verified today version and it reported 100% correct results.

How this tool works?

I get a lot of questions on what’s the logic behind getting a “YES” (vulnerable) result for a host. People were wondering whether the check was just “pinging the host”, or “checking SMBv1 status”, or “finding shares”. The answer to all three is “no”.

Eternal Blues checks the existence of the EternalBlue vulnerability by sending 4 crafted SMB messages. There are many references online for the technical stuff. I think the best executive summary I read was Rapid7’s:

“…it connects to the IPC$ tree and attempts a transaction on FID 0. If the status returned is “STATUS_INSUFF_SERVER_RESOURCES”, the machine does not have the MS17-010 patch.”

Also seems like a patched host (with MS17-010) will return STATUS_INVALID_HANDLE or STATUS_ACCESS_DENIED.

The 4 crafted SMB messages are:

  • SMB Negotiate Protocol
  • SMB Session Setup AndX Request
  • SMB Tree Connect (to IPC$)
  • SMB Peek Named Pipe

Getting STATUS_INSUFF_SERVER_RESOURCES as the SMB status of the 4th message means host is vulnerable.

What’s next?

  • Releases visibility (communicating new content for each version)
  • Some bug fixes (mainly UI, hopefully no more mismatches)
  • Taking some feature requests
  • Statistics. Prepare for some (super) Power BI


Eternal Blues – 72 hours update

It’s been three days since launch.  The exposure “Eternal Blues” got  is mind blowing – first day was very quiet, but then I had over 5,000 visits in 2 days (way more than I imagined). Actually, this traffic peak is all thanks to Tal Be’ery, Mirko Zorz (Help Net Security, Twitter) and Bleeping Computer (Twitter) – without your help, I bet I had only 100 visitors for this weekend. So one big THANK YOU for the three of you!

I got a few appreciation emails – people actually found vulnerable computers, which is fantastic. I also got a few people wondering about some false positives (work in progress fixed!), asking for feature requests and suggesting improvements. This is all truly amazing. and also a lot to process in such a short time. All, please be patient, I’ll do my best answering you all and fixing wherever needed. Stay tuned.

Eternal Blues

Eternal Blues is a free EternalBlue vulnerability scanner. It helps finding the blind spots in your network, these endpoints that are still vulnerable to EternalBlue.

Just hit the SCAN button and you will immediately start to get which of your computers are vulnerable and which aren’t. That’s it.


If you wish, you can switch networks, or edit your own (yeah, you can also scan the world wide web if you wish). Please use it for good cause only. We have enough bad guys already…


Follow for latest updates twitterbird_RGB


Was this tool tested in real networks?

Oh yeah. Obviously I cannot say which, but with almost every network I connected to, there were a few vulnerable computers.

IMPORTANT: It does *not* exploit the vulnerability, but just checks whether it is exploitable.

July 12, 2017: Worldwide statistics are available
August 7, 2017: Stats explained

Yet another vulnerability scanner?

There are many vulnerability scanners out there. So… why did I create another? Mainly for the ease of use. The majority of latest WannaCry, NoPetya (Petya, GoldenEye or whatever) victims, are not technical organizations and sometimes just small business who don’t have a security team, or even just an IT team to help them mitigate this. Running NMap, Metasploit (not to mention more commercial products) is something they will never do. I aimed to create a simple ‘one-button’ tool that tells you one thing and one thing only – which systems are vulnerable in your network.



This is a free tool provided for your benefit & security. I don’t charge for it.  It is here to help you and also to help me getting worldwide statistics. Learn more about it.



  • If you’re about to run it in your working environment, please update the IT/Security team in advance. You don’t want to cause (IDS/IPS/AV) false alarms
  • If vulnerable systems were found – please take a Windows update asap

  • For God’s sake, please disable SMBv1 already. Whether your systems are patched or not. This protocol was written over 3 decades ago…!
  • If you would like to enjoy the tool but disallow sending anonymous statistics (which is so uncool), disable access to my website


Final words

I really hope this can help people and organizations protecting against the next attack.

This is a no-guarantees-use-at-your-own-risk tool.

Special thanks to Jonathan Smith for his contribution!

Please share your feedback –

  • Twitter: Omerez
  • LinkedIn: Elad Erez
  • Email: EternalBlues! (replace ‘!’ with ‘@’)
  • Comment below

DOWNLOAD HERE (Learn more in version history)