Cyware Social
will be sunset on April 15, 2026. The service is being replaced by
Cyware's Daily Threat Intel Briefs,
offering curated security advisories on the latest threats. Enterprise users can contact us
here → for more details.
A Monero cryptocurrency mining campaign has made the headlines exploiting a known vulnerability in public-facing web apps. These web apps are built on the ASP.NET open-source framework.
What is happening?
The campaign has been named Blue Mockingbird by Red Canary analysts who detected this operation. The threat actors have been found to exploit a deserialization vulnerability, CVE-2019-18935, that permits remote code execution. The bug is found in the Progress Telerik UI front-end offering for ASP.NET AJAX.
What the experts are saying
The analysts at Red Canary explained, “Each payload comes compiled with a standard list of commonly used Monero-mining domains alongside a Monero wallet address.”
Two wallet addresses have been identified.
It is suspected that Blue Mockingbird maybe experimenting with various tools to create SOCKS proxies for pivoting.
What else
Currently, the campaign is revealing unpatched versions of Telerik UI for ASP.NET.
The vulnerability especially lies in RadAsyncUpload function.
Although the campaign is making marks, the toolkit is still a developing one.
What you can do
Patch web servers and apps.
Prevent threats by patching dependencies of apps to evade initial access.