And you can expect to find it used in the wild in about a few seconds next...
(At least, luckily it got discovered though public channels : It got published by shadowbrocker and got analysed by experts.
So at least our sysadmin have heard about it.
Security solutions vendor will try to get ways to detect and neutralize it.
Imagine if instead it was discovered by a few blackhats who reverse engineered a sample, and decided to incorporate the technology into their exploits, without the information ever reaching the public).