Following the news about Shadow Brokers Data Dump, IT security experts from Tenable and Cryptzone commented below.
Cris Thomas, Strategist at Tenable Network Security:
“Many of the patches for the exploits provided by the Shadow Brokers have only just recently been released, meaning that many organisations may not have had time to run those patches through their patch management processes and get them applied to their critical systems. Of course, just because a patch is available doesn’t automatically mean your organisation is safe. The pervasiveness and severity of some of the vulnerabilities in this drop makes it critical that you’re able to properly prioritise and patch every affected system in your environment.
“In some cases, those patches may never be applied, whether due to a conscious decision to preserve the operational status of a crucial system, or possibly due to imperfect knowledge about what’s on the network and the impact of these blind spots on overall security. A look at historical patch MS08-67 is an excellent example. This critical vulnerability from 2008 is one that lived for years within organisations. This is the first thing that penetration testers would look for when compromising a network. MS08-67 has now been replaced by MS17-10. While there is a patch available, there will always be one machine that someone overlooked that a penetration tester or an attacker will find and use to compromise your network.
“This is why conducting a proper system inventory is of such high importance to any commercial organisation or government agency. You can’t protect what you don’t know. You can’t patch it either.”
Leo Taddeo, Chief Security Officer at Cryptzone:
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.