Download Certificate- CMOs | ECIO | Most Admired Brand | Most Trusted Company

Blue Mockingbird, a codename that infects enterprise systems


By MYBRANDBOOK


Blue Mockingbird, a codename that infects enterprise systems

Blue Mockingbird, a hacker group is believed to infect thousands of enterprise systems, with a cryptocurrency mining malware. Malware analysts from cloud security firm Red Canary spotted this malware early this month, but the Blue Mockingbird group has been active since December 2019.

 

According to the researchers the Blue Mockingbird attacks public-facing servers that run on ASP.NET apps using the Telerik framework for their user interface (UI) component.

 

The hackers exploited the vulnerability dubbed as CVE-2019-18935 to insert a web shell on the attacked server. A version of the Juicy Potato technique was used to get admin-level access and modify server settings to obtain (re)boot persistence.

 

On attaining complete access to a system, the gang downloaded and installed a version of XMRRig, which is a popular cryptocurrency mining app for the Monero (XMR) cryptocurrency.

 

According to the ex gh weakly-secure RDP (Remote Desktop Protocol) or SMB (Server Message Block) connections.

 

The researchers do not have full details about the botnet’s operations, yet they believe that the botnet must have made at least 1,000 infections so far. They say that the number of companies affected could be much higher, and even companies that are considered to be safe are also at risk of attack.

 

The vulnerable Telerik UI component might be part of ASP.NET applications that are running on their latest versions. But the Telerik component might be outdated posing risk to the companies.

 

The Telerik UI CVE-2019-18935 vulnerability has been listed as one of the most exploited vulnerabilities used to plant web shells on servers.

 

In cases where the organizations do not have an option to update their vulnerable apps, they must ensure that they block exploitation attempts for CVE-2019-18935 at their firewall level. And if they do not have a web firewall, they must check for a compromise at the server and workstation level. 

 E-Magazine 
 VIDEOS  Placeholder image

Copyright www.mybrandbook.co.in @1999-2024 - All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.
Other Initiatives : www.varindia.com | www.spoindia.org