EternalBlue

computer security exploit
Event exploit Q29916946
Press Enter · cited answer in seconds

EternalBlue

Summary

EternalBlue is an exploit[1]. EternalBlue draws 705 Wikipedia views per month (exploit category, ranking #1 of 5).[2]

Key Facts

  • EternalBlue authored National Security Agency[3].
  • EternalBlue's instance of is recorded as exploit[4].
  • EternalBlue's publisher is recorded as The Shadow Brokers[5].
  • EternalBlue's Google Knowledge Graph ID is recorded as /g/11dd_swckw[6].
  • EternalBlue's Common Vulnerabilities and Exposures ID is recorded as CVE-2017-0144[7].
  • EternalBlue's derivative work is recorded as Petya[8].
  • EternalBlue's derivative work is recorded as WannaCry[9].

Body

Works and Contributions

EternalBlue authored National Security Agency[3].

Why It Matters

EternalBlue draws 705 Wikipedia views per month (exploit category, ranking #1 of 5).[2] EternalBlue has Wikipedia articles in 16 language editions, a strong signal of global cultural recognition.[10] EternalBlue is known by 4 alternative names across languages and contexts.[11]

📑 Cite this page

Use these citations when quoting this entity in research, articles, AI prompts, or wherever provenance matters. We aggregate Wikidata + Wikipedia + authoritative open-data sources; the stitched, scored, cross-referenced view is what 4ort.xyz contributes.

APA 4ort.xyz Knowledge Graph. (2026). EternalBlue. Retrieved May 3, 2026, from https://4ort.xyz/entity/eternalblue
MLA “EternalBlue.” 4ort.xyz Knowledge Graph, 4ort.xyz, 3 May. 2026, https://4ort.xyz/entity/eternalblue.
BibTeX @misc{4ortxyz_eternalblue_2026, author = {{4ort.xyz Knowledge Graph}}, title = {{EternalBlue}}, year = {2026}, url = {https://4ort.xyz/entity/eternalblue}, note = {Accessed: 2026-05-03}}
LLM prompt According to 4ort.xyz Knowledge Graph (aggregator of Wikidata, Wikipedia, and authoritative open-data sources): EternalBlue — https://4ort.xyz/entity/eternalblue (retrieved 2026-05-03)

Canonical URL: https://4ort.xyz/entity/eternalblue · Last refreshed: