Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

Crypto-Mining Botnet Implements BlueKeep Scanner

A cryptocurrency-mining botnet has recently added a scanner for the BlueKeep RDP protocol vulnerability, Intezer’s security researchers have discovered. 

A cryptocurrency-mining botnet has recently added a scanner for the BlueKeep RDP protocol vulnerability, Intezer’s security researchers have discovered. 

Dubbed WatchBog, the botnet has been active since late 2018 and previously only targeted Linux systems. Largely undetected at the moment, the malware has infected over 4,500 Linux machines in new attacks observed since early June, and it appears that its operators are looking to expand their reach.

The group has been targeting known vulnerabilities in Linux systems, and has recently expanded its implants list to target more servers. It now includes recently published exploits, such as Jira’s CVE-2019-11581, Exim’s CVE-2019-10149, and Solr’s CVE-2019-0192, Intezer says.

Additionally, the crypto-mining botnet now includes a scanner for BlueKeep, a Windows-based kernel vulnerability tracked as CVE–2019-0708 and which allows an attacker to remotely execute code on a vulnerable system. 

Function name similarities suggest that the tool is a Python port from a scanner available on GitHub. At the moment, the botnet only appears to be creating lists of vulnerable systems, the security researchers say.

The BlueKeep security flaw impacts Windows versions ranging from Windows 2000 to Windows Server 2008 and Windows 7, but a patch has been available for several months. 

While there have been no attacks observed in the wild targeting the vulnerability to cause a crash and achieve code execution, information on how to turn the crash into the RCE has emerged online earlier this week, security researcher MalwareTech warns.

The researcher also reveals that the slides include information on how to do a pool spray, which was apparently the most difficult part of the exploit. While information on other aspects of the vulnerability’s exploitation were already publicly available, this was the only missing element, it seems. 

With WatchBog now able to scan for the BlueKeep vulnerability, it becomes clear that it will be only a matter of time before the botnet adds an exploit as well. 

“The Jira, Solr and BlueKeep scanner modules were all added in the time frame of 13 days. WatchBog seems to be accelerating the incorporation of new functionalities as of late,” Intezer notes. 

Related: DHS Issues Alert for Windows ‘BlueKeep’ Vulnerability

Related: One Million Devices Vulnerable to BlueKeep as Hackers Scan for Targets

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.