<div dir="ltr">Forwarding to AKLUG as well.<div><br clear="all"><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr">-- </div><div dir="ltr"><span style="font-size:12.8px">Royce</span><br></div></div></div></div></div></div></div><br><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">---------- Forwarded message ---------<br>From: <strong class="gmail_sendername" dir="auto">Royce Williams</strong> <span dir="auto"><<a href="mailto:royce@techsolvency.com">royce@techsolvency.com</a>></span><br>Date: Tue, Aug 6, 2019 at 7:02 AM<br>Subject: BlueKeep vulnerability - survey of current Alaskan attack surface<br>To: AKLUG <<a href="mailto:aklug@aklug.org">aklug@aklug.org</a>>, <<a href="mailto:nuga@groups.io">nuga@groups.io</a>><br></div><br><br><div dir="ltr">Most of you have probably already heard about the BlueKeep RDP vulnerability, that Microsoft deems as wormable.<div><br></div><div>What you may not have heard is that a reliable remote exploit is being privately managed by multiple scanning/pentesting companies and frameworks, which means that it could be leaked to ransomware authors more easily as time goes on.<div><br></div><div>At this writing, 66 Alaskan systems still appear to be vulnerable (down from 109 when I originally started scanning on May 28th).</div><div><br></div><div>I have worked privately with some entities to notify owners, but as the exposure of the exploit goes up, it's a good idea to take a second look at your public-facing RDP.</div><div><br></div><div>Here are my current results. As I have done in the past, I've tried to reduce the exposure of this information by limiting it to be reachable only from "Alaskan-looking" IP space.</div><div><br></div><div><a href="https://www.techsolvency.com/private/bluekeep/current.txt" target="_blank">https://www.techsolvency.com/private/bluekeep/current.txt</a><br></div><div><br></div><div>I list the raw IP, ASN info, and the reverse DNS (PTR record).</div><div><br></div><div>NOTE: At the bottom of the file, I also list all subnets that I am scanning - the ones that "look Alaskan". If you are aware of a subnet that isn't listed, *please* let me know and I will add it and perform a fresh scan.<br></div><div><br></div><div>Please also note that I am doing this as a "best effort" service to the Alaskan public pro bono, on my own time, and under my sole responsibility.</div><div><br></div><div><div>Feel free to ping me if you have any questions.</div><div><br></div></div><div>Royce</div><div><br clear="all"><div><div dir="ltr" class="m_5192103226957676027m_5204726946592729629gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div>-- </div><div>Royce Williams<br>Tech Solvency</div></div></div></div></div></div></div>
</div></div></div>