Saturday, April 5, 2025
Homecyber securityBlue Mockingbird Hacker Group Attack Windows Machines at Multiple Organizations to Deploy...

Blue Mockingbird Hacker Group Attack Windows Machines at Multiple Organizations to Deploy cryptocurrency-mining Malware

Published on

SIEM as a Service

Follow Us on Google News

Security researchers from Red Canary discovered potential hacker group Blue Mockingbirddeploying Monero cryptocurrency-mining payloads deployed on the Internet-facing Windows machines at multiple organizations.

The group found to be active since December 2019 and they use several techniques to bypass security technologies.

Blue Mockingbird Campaign

To gain initial access attackers exploit public-facing web applications those specifically using Telerik UI for ASP.NET AJAX.

Telerik UI is a suite of user interface components that helps in the web development process, 2019.3.1023 version affected with deserialization vulnerability(CVE-2019-18935).

This vulnerability found to be exploited by Blue Mockingbird to gain initial access to the system and to escalate privileges they use the JuicyPotato technique.

Once they gain full access to the system they deploy a popular version of Monero-mining tool XMRIG packaged as a DLL.

To maintain persistence the hacker group uses a novel “COR_PROFILER COM hijack to execute a malicious DLL and restore items removed by defenders.”

As the COR_PROFILER method was configured every process that loads the Microsoft .NET Common Language Runtime would establish persistence.

In some cases, the actor even created a new service to perform the same actions as the COR_PROFILER payload, reads Red Canary blog post.

By using the JuicyPotato exploit the hacker group escalates privileges from an IIS Application Pool Identity virtual account to the NT Authority\SYSTEM account.

Blue Mockingbird uses these techniques to move laterally and distribute mining payloads across the enterprise.

Once they escalate the privilege to NT Authority\SYSTEM, attackers use RDP to deploy payload on the remote systems, in some cases the tasks were created remotely.

To mitigate the attacks, it is recommended to patching web servers, web applications, and dependencies of the applications. Red Canary published a detailed report with indicators Indicators of compromise.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...